CVE-2011-3597
Publication date 13 January 2012
Last updated 24 July 2024
Ubuntu priority
Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
Status
Package | Ubuntu Release | Status |
---|---|---|
libdigest-perl | ||
perl | ||
Notes
mdeslaur
fixed in digest 1.17
jdstrand
from RedHat bug: "To successfully exploit this vulnerability, the attacker must already be able to execute Perl code or be able to set the algorithm name to be used by the constructor in the form "$ctx =
Digest-
new(XXX => $arg,...)", which is very unlikely to happen."
References
Related Ubuntu Security Notices (USN)
- USN-1643-1
- Perl vulnerabilities
- 30 November 2012