Vulnerability Description
The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rafael Garcia-Suarez | Safe | 2.08 |
| Perl | Perl | All versions |
Related Weaknesses (CWE)
References
- http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-securi
- http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in
- http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://secunia.com/advisories/40049Vendor Advisory
- http://secunia.com/advisories/40052Vendor Advisory
- http://secunia.com/advisories/42402
- http://securitytracker.com/id?1024062Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:115
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
- http://www.openwall.com/lists/oss-security/2010/05/20/5
- http://www.redhat.com/support/errata/RHSA-2010-0457.htmlVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2010-0458.htmlVendor Advisory
- http://www.vupen.com/english/advisories/2010/3075
FAQ
What is CVE-2010-1168?
CVE-2010-1168 is a vulnerability with a CVSS score of 7.5 (HIGH). The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, v...
How severe is CVE-2010-1168?
CVE-2010-1168 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1168?
Check the references section above for vendor advisories and patch information. Affected products include: Rafael Garcia-Suarez Safe, Perl Perl.