Vulnerability Description
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perl | Perl | < 5.23.9 |
| Debian | Debian Linux | 7.0 |
| Oracle | Communications Billing And Revenue Management | 7.5 |
| Oracle | Configuration Manager | < 12.1.2.0.4 |
| Oracle | Database Server | 11.2.0.4 |
| Oracle | Enterprise Manager Base Platform | 13.2.0.0.0 |
| Oracle | Timesten In-Memory Database | < 18.1.2.1.0 |
| Oracle | Solaris | 11.3 |
| Opensuse | Opensuse | 13.2 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.htmlMailing ListThird Party Advisory
- http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cVendor Advisory
- http://www.debian.org/security/2016/dsa-3501Third Party Advisory
- http://www.gossamer-threads.com/lists/perl/porters/326387Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlThird Party Advisory
- http://www.securityfocus.com/bid/83802Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2916-1Third Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-cThird Party Advisory
- https://security.gentoo.org/glsa/201701-75Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2020.htmlThird Party Advisory
- https://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.htmlMailing ListThird Party Advisory
- http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cVendor Advisory
FAQ
What is CVE-2016-2381?
CVE-2016-2381 is a vulnerability with a CVSS score of 7.5 (HIGH). Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
How severe is CVE-2016-2381?
CVE-2016-2381 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2381?
Check the references section above for vendor advisories and patch information. Affected products include: Perl Perl, Debian Debian Linux, Oracle Communications Billing And Revenue Management, Oracle Configuration Manager, Oracle Database Server.