The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2014/q1/56 - | |
References | () http://seclists.org/oss-sec/2014/q1/62 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734789 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1030572 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1051108 - | |
References | () https://rt.cpan.org/Public/Bug/Display.html?id=90474 - Patch |
Information
Published : 2014-04-29 14:38
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7284
Mitre link : CVE-2013-7284
CVE.ORG link : CVE-2013-7284
JSON object : View
Products Affected
malcolm_nooning
- pirpc
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')