CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
91.8%
Strawberry Perl is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.802562");
script_version("2024-02-15T05:05:40+0000");
script_cve_id("CVE-2011-5060", "CVE-2011-4114", "CVE-2011-3597", "CVE-2011-2939",
"CVE-2011-2728");
script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
script_tag(name:"creation_date", value:"2012-01-17 17:28:53 +0530 (Tue, 17 Jan 2012)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Strawberry Perl Modules Multiple Vulnerabilities - Windows");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_perl_detect_win.nasl");
script_mandatory_keys("Strawberry/Perl/Ver");
script_xref(name:"URL", value:"http://search.cpan.org/dist/Digest/Digest.pm");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/49911");
script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=731246");
script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=753955");
script_xref(name:"URL", value:"https://rt.cpan.org/Public/Bug/Display.html?id=69560");
script_tag(name:"impact", value:"Successful exploitation will allow attackers to cause an affected
application to crash or execute arbitrary perl code.");
script_tag(name:"affected", value:"Strawberry Perl PAR module before 1.003
Strawberry Perl Digest module before 1.17
Strawberry Perl Encode module before 2.44
Strawberry Perl PAR::Packer module before 1.012");
script_tag(name:"insight", value:"The flaws are due to
- an error in par_mktmpdir function in the 'PAR::Packer' and 'PAR' modules
creates temporary files in a directory with a predictable name without
verifying ownership and permissions of this directory.
- the 'Digest->new()' function not properly sanitising input before using it
in an 'eval()' call, which can be exploited to inject and execute arbitrary
perl code.
- off-by-one error in the decode_xs function in Unicode/Unicode.xs in the
'Encode' module.
- An error within the 'File::Glob::bsd_glob()' function when handling the
GLOB_ALTDIRFUNC flag can be exploited to cause an access violation and
potentially execute arbitrary code.");
script_tag(name:"summary", value:"Strawberry Perl is prone to multiple vulnerabilities.");
script_tag(name:"solution", value:"Update to Strawberry Perl 5.14.2 or later
Update to Strawberry Perl PAR module version 1.003 or later
Update to Strawberry Perl Digest module version 1.17 or later
Update to Strawberry Perl Encode module version 2.44 or later
Update Strawberry Perl PAR::Packer module version 1.012 or later");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
CPE = "cpe:/a:vanilla_perl_project:strawberry_perl";
include( "host_details.inc" );
include( "version_func.inc" );
## Perl Digest and Perl Encode modules are the default modules in perl
## having Digest and Encode modules < 1.17 and 2.44 respectively
if( ! infos = get_app_version_and_location( cpe: CPE, exit_no_version: TRUE ) ) exit( 0 );
version = infos["version"];
location = infos["location"];
if( version_is_less( version: version, test_version: "5.14.2" ) ) {
report = report_fixed_ver( installed_version: version, fixed_version: "5.14.2", install_path: location );
security_message( data: report, port: 0 );
exit( 0 );
}
exit( 99 );