CVE-2011-1487

The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://openwall.com/lists/oss-security/2011/04/01/3 Exploit Patch
http://openwall.com/lists/oss-security/2011/04/04/35 Exploit Patch
http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99 Patch
http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336 Exploit
http://secunia.com/advisories/43921 Vendor Advisory
http://secunia.com/advisories/44168
http://www.debian.org/security/2011/dsa-2265
http://www.mandriva.com/security/advisories?name=MDVSA-2011:091
http://www.securityfocus.com/bid/47124 Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=692844
https://bugzilla.redhat.com/show_bug.cgi?id=692898 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/66528
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://openwall.com/lists/oss-security/2011/04/01/3 Exploit Patch
http://openwall.com/lists/oss-security/2011/04/04/35 Exploit Patch
http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99 Patch
http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336 Exploit
http://secunia.com/advisories/43921 Vendor Advisory
http://secunia.com/advisories/44168
http://www.debian.org/security/2011/dsa-2265
http://www.mandriva.com/security/advisories?name=MDVSA-2011:091
http://www.securityfocus.com/bid/47124 Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=692844
https://bugzilla.redhat.com/show_bug.cgi?id=692898 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/66528
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html -
References () http://openwall.com/lists/oss-security/2011/04/01/3 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/04/01/3 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/04/04/35 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/04/04/35 - Exploit, Patch
References () http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99 - Patch () http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99 - Patch
References () http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336 - Exploit () http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336 - Exploit
References () http://secunia.com/advisories/43921 - Vendor Advisory () http://secunia.com/advisories/43921 - Vendor Advisory
References () http://secunia.com/advisories/44168 - () http://secunia.com/advisories/44168 -
References () http://www.debian.org/security/2011/dsa-2265 - () http://www.debian.org/security/2011/dsa-2265 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:091 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:091 -
References () http://www.securityfocus.com/bid/47124 - Exploit () http://www.securityfocus.com/bid/47124 - Exploit
References () https://bugzilla.redhat.com/show_bug.cgi?id=692844 - () https://bugzilla.redhat.com/show_bug.cgi?id=692844 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=692898 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=692898 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66528 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66528 -

Information

Published : 2011-04-11 18:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1487

Mitre link : CVE-2011-1487

CVE.ORG link : CVE-2011-1487


JSON object : View

Products Affected

perl

  • perl
CWE
CWE-264

Permissions, Privileges, and Access Controls