[Bug 1510782] New: CVE-2008-7319 perl-Net-Ping-External: Unproper argument sanitization

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1510782

            Bug ID: 1510782
           Summary: CVE-2008-7319 perl-Net-Ping-External: Unproper
                    argument sanitization
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: high
          Priority: high
          Assignee: security-response-team@xxxxxxxxxx
          Reporter: anemec@xxxxxxxxxx
                CC: mitr@xxxxxxxxxx, perl-devel@xxxxxxxxxxxxxxxxxxxxxxx




The Net::Ping::External extension through 0.15 for Perl does not properly
sanitize arguments (e.g., invalid hostnames) containing shell metacharacters
before use of backticks in External.pm, allowing for shell command injection
and arbitrary command execution if untrusted input is used.

Upstream issue:

https://rt.cpan.org/Public/Bug/Display.html?id=33230

References:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881097
http://www.openwall.com/lists/oss-security/2017/11/07/4

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]

  Powered by Linux