RHEL 6:perl (RHSA-2011:0558)

critical Nessus 插件 ID 54593

简介

远程 Red Hat 主机缺少一个或多个 perl 安全更新。

描述

远程 Redhat Enterprise Linux 6 主机上安装的程序包受到 RHSA-2011:0558 公告中提及的多个漏洞影响。

- perl-CGI、perl-CGI-Simple:CVE-2010-2761 - 多部分内容的硬编码 MIME 边界值,CVE-2010-4410 - 允许拆分 HTTP 响应的 CRLF 注入(CVE-2010-2761、CVE-2010-4410)

- perl:lc()、uc() 例程正在清理被感染的数据 (CVE-2011-1487)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

依据 RHSA-2011:0558 中的指南更新 RHEL perl 程序包。

另见

http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.51/Changes

http://www.nessus.org/u?6ffc56ac

https://access.redhat.com/errata/RHSA-2011:0558

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=609492

https://bugzilla.redhat.com/show_bug.cgi?id=626330

https://bugzilla.redhat.com/show_bug.cgi?id=640716

https://bugzilla.redhat.com/show_bug.cgi?id=640720

https://bugzilla.redhat.com/show_bug.cgi?id=640729

https://bugzilla.redhat.com/show_bug.cgi?id=658976

https://bugzilla.redhat.com/show_bug.cgi?id=692898

插件详情

严重性: Critical

ID: 54593

文件名: redhat-RHSA-2011-0558.nasl

版本: 1.9

类型: local

代理: unix

发布时间: 2011/5/20

最近更新时间: 2024/4/21

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 4.2

CVSS v2

风险因素: Medium

基本分数: 5

时间分数: 3.9

矢量: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS 分数来源: CVE-2011-1487

CVSS v3

风险因素: Critical

基本分数: 10

时间分数: 9

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

CVSS 分数来源: CVE-2010-4410

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:perl, p-cpe:/a:redhat:enterprise_linux:perl-archive-extract, p-cpe:/a:redhat:enterprise_linux:perl-archive-tar, p-cpe:/a:redhat:enterprise_linux:perl-cgi, p-cpe:/a:redhat:enterprise_linux:perl-cpan, p-cpe:/a:redhat:enterprise_linux:perl-cpanplus, p-cpe:/a:redhat:enterprise_linux:perl-compress-raw-zlib, p-cpe:/a:redhat:enterprise_linux:perl-compress-zlib, p-cpe:/a:redhat:enterprise_linux:perl-digest-sha, p-cpe:/a:redhat:enterprise_linux:perl-extutils-cbuilder, p-cpe:/a:redhat:enterprise_linux:perl-extutils-embed, p-cpe:/a:redhat:enterprise_linux:perl-extutils-makemaker, p-cpe:/a:redhat:enterprise_linux:perl-extutils-parsexs, p-cpe:/a:redhat:enterprise_linux:perl-file-fetch, p-cpe:/a:redhat:enterprise_linux:perl-io-compress-base, p-cpe:/a:redhat:enterprise_linux:perl-io-compress-zlib, p-cpe:/a:redhat:enterprise_linux:perl-io-zlib, p-cpe:/a:redhat:enterprise_linux:perl-ipc-cmd, p-cpe:/a:redhat:enterprise_linux:perl-locale-maketext-simple, p-cpe:/a:redhat:enterprise_linux:perl-log-message, p-cpe:/a:redhat:enterprise_linux:perl-log-message-simple, p-cpe:/a:redhat:enterprise_linux:perl-module-build, p-cpe:/a:redhat:enterprise_linux:perl-module-corelist, p-cpe:/a:redhat:enterprise_linux:perl-module-load, p-cpe:/a:redhat:enterprise_linux:perl-module-load-conditional, p-cpe:/a:redhat:enterprise_linux:perl-module-loaded, p-cpe:/a:redhat:enterprise_linux:perl-module-pluggable, p-cpe:/a:redhat:enterprise_linux:perl-object-accessor, p-cpe:/a:redhat:enterprise_linux:perl-package-constants, p-cpe:/a:redhat:enterprise_linux:perl-params-check, p-cpe:/a:redhat:enterprise_linux:perl-parse-cpan-meta, p-cpe:/a:redhat:enterprise_linux:perl-pod-escapes, p-cpe:/a:redhat:enterprise_linux:perl-pod-simple, p-cpe:/a:redhat:enterprise_linux:perl-term-ui, p-cpe:/a:redhat:enterprise_linux:perl-test-harness, p-cpe:/a:redhat:enterprise_linux:perl-test-simple, p-cpe:/a:redhat:enterprise_linux:perl-time-hires, p-cpe:/a:redhat:enterprise_linux:perl-time-piece, p-cpe:/a:redhat:enterprise_linux:perl-core, p-cpe:/a:redhat:enterprise_linux:perl-devel, p-cpe:/a:redhat:enterprise_linux:perl-libs, p-cpe:/a:redhat:enterprise_linux:perl-parent, p-cpe:/a:redhat:enterprise_linux:perl-suidperl, p-cpe:/a:redhat:enterprise_linux:perl-version, cpe:/o:redhat:enterprise_linux:6

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2011/5/19

漏洞发布日期: 2010/12/6

参考资料信息

CVE: CVE-2010-2761, CVE-2010-4410, CVE-2011-1487

BID: 45145, 47124

RHSA: 2011:0558