Vulnerability Description
Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gisle Aas | Digest | 1.00 |
Related Weaknesses (CWE)
References
- http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc
- http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://secunia.com/advisories/46279Vendor Advisory
- http://secunia.com/advisories/51457
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:008
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:009
- http://www.redhat.com/support/errata/RHSA-2011-1424.html
- http://www.redhat.com/support/errata/RHSA-2011-1797.html
- http://www.securityfocus.com/bid/49911
- http://www.ubuntu.com/usn/USN-1643-1
- https://bugzilla.redhat.com/show_bug.cgi?id=743010Patch
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc
FAQ
What is CVE-2011-3597?
CVE-2011-3597 is a vulnerability with a CVSS score of 7.5 (HIGH). Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
How severe is CVE-2011-3597?
CVE-2011-3597 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3597?
Check the references section above for vendor advisories and patch information. Affected products include: Gisle Aas Digest.