perl-5.8.8-40.0.1.AXS3
エラータID: AXSA:2013-340:01
リリース日:
2013/04/08 Monday - 12:24
題名:
perl-5.8.8-40.0.1.AXS3
影響のあるチャネル:
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- perl の util.c の Perl_repeatcpy 関数にはヒープベースのバッファーオーバーフローが存在し, 'x' 文字列繰り返し演算子によって,攻撃者がサービス拒否 (メモリ消費とクラッシュ) を引き起こしたり,任意のコードを実行する可能性のある脆弱性があります。(CVE-2012-5195)
- Perl の CGI.pm モジュールには (1) Set-Cookie あるいは (2) P3P ヘッダの改行を適切にエスケープしておらず,リモートの攻撃者が任意のヘッダを CGI.pm を使用したアプリケーションからのレスポンスへ注入する脆弱性があります。(CVE-2012-5526)
- Perl の Locale::Maketext 実装の Maketext.pm の _compile 関数は,角かっこの表記をコンパイル中にバックスラッシュと完全修飾メソッド名を適切に扱うことができず,アプリケーションへの巧妙に細工された入力によって,攻撃者が任意のコマンドを実行できる脆弱性があります。(CVE-2012-6329)
- Perl のリハッシュメカニズムには,巧妙に細工されたハッシュキーによって,攻撃者がサービス拒否 (メモリの消費とクラッシュ) を引き起こす脆弱性があります。(CVE-2013-1667)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2012-5195
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
CVE-2012-5526
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
CVE-2012-6329
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
CVE-2013-1667
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
追加情報:
N/A
ダウンロード:
SRPMS
- perl-5.8.8-40.0.1.AXS3.src.rpm
MD5: 44c6e9267085bb454752e300de6b97d5
SHA-256: 27b9021b1b9c67f56c4ae5c0fd274c07d2a7708af6a8adeda4e3aa6a2a42f9a0
Size: 10.25 MB
Asianux Server 3 for x86
- perl-5.8.8-40.0.1.AXS3.i386.rpm
MD5: 5edabe194ea6603e60ae80b5d7ebc50e
SHA-256: 365fde64eaff2c1f747f4b888bded77e4f5e39fdbacb9eb6c4a1c31e38c6a046
Size: 11.79 MB - perl-suidperl-5.8.8-40.0.1.AXS3.i386.rpm
MD5: 45a435b92e8efd1eace7962b70c02d91
SHA-256: 57cfa1676cdadff48e405b0748b6b765739ecf5738f876bbc8389eb57ed53eff
Size: 64.43 kB
Asianux Server 3 for x86_64
- perl-5.8.8-40.0.1.AXS3.x86_64.rpm
MD5: c163f9dc5cd058f155f7e686e52ebb7c
SHA-256: 40dea708d0f68ddb1315133781b5c1651b52daaab2b986de04187ca80d24b8b5
Size: 12.42 MB - perl-suidperl-5.8.8-40.0.1.AXS3.x86_64.rpm
MD5: 0fea4c04320161ca7dac3cd4b9d76d78
SHA-256: bf64b329bfad4ac90c9d9f8fe709c1080f55d355df30734b2434dbe311c27cce
Size: 65.19 kB