[Bug 658976] CVE-2010-2761 CVE-2010-4410 perl-CGI: multiple vulnerabilites via a crafted URL

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=658976

Vincent Danen <vdanen@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
            Summary|CVE-2010-2761 perl-CGI:     |CVE-2010-2761 CVE-2010-4410
                   |CRLF injection              | perl-CGI: multiple
                   |vulnerability via a crafted |vulnerabilites via a
                   |URL                         |crafted URL
              Alias|                            |CVE-2010-4410

--- Comment #4 from Vincent Danen <vdanen@xxxxxxxxxx> 2010-12-07 17:26:40 EST ---
Ahhh... MITRE has this broken down as two issues, the second of which is here:

Name: CVE-2010-4410
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410
Assigned: 20101206
Reference: MLIST:[oss-security] 20101201 CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/1
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/3
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/2
Reference: CONFIRM: http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1
Reference: CONFIRM:
http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html
Reference: BID:45145
Reference: URL: http://www.securityfocus.com/bid/45145

CRLF injection vulnerability in the header function in (1) CGI.pm
before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows
remote attackers to inject arbitrary HTTP headers and conduct HTTP
response splitting attacks via vectors related to non-whitespace
characters preceded by newline characters, a different vulnerability
than CVE-2010-2761 and CVE-2010-3172.


I'm noting both together as I believe they should have equal affects across
affected products (i.e. one won't affect in a place where another doesn't).  If
that is incorrect, we may need to split this bug into two.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel


[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux