wid-sec-w-2023-1393
Vulnerability from csaf_certbund
Published
2015-06-28 22:00
Modified
2023-07-03 22:00
Summary
Perl: Schwachstelle ermöglicht Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Perl ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Perl ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Perl ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Perl ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1393 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2015/wid-sec-w-2023-1393.json" }, { "category": "self", "summary": "WID-SEC-2023-1393 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1393" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1775 vom 2023-07-04", "url": "https://alas.aws.amazon.com/ALAS-2023-1775.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1767 vom 2023-06-09", "url": "https://alas.aws.amazon.com/ALAS-2023-1767.html" }, { "category": "external", "summary": "Meldung auf der oss-sec Mailing Liste vom 2015-06-28", "url": "http://seclists.org/oss-sec/2015/q2/808" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2694-1 vom 2015-07-29", "url": "http://www.ubuntu.com/usn/usn-2694-1/" }, { "category": "external", "summary": "F5 Security Advisory sol17331 vom 2015-09-29", "url": "https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17331.html?ref=rss" }, { "category": "external", "summary": "Red Hat Security RHSA-2016:1025-1 vom 2016-05-11", "url": "http://rhn.redhat.com/errata/RHSA-2016-1025.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1132-1", "url": "http://rhn.redhat.com/errata/RHSA-2016-1132.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:2750 vom 2016-11-15", "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2971-1 vom 2016-12-02", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162971-1.html" } ], "source_lang": "en-US", "title": "Perl: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2023-07-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:17.220+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1393", "initial_release_date": "2015-06-28T22:00:00.000+00:00", "revision_history": [ { "date": "2015-06-28T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2015-06-28T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2015-07-29T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2015-07-29T22:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2015-07-29T22:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2015-07-29T22:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2016-05-11T22:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2016-05-11T22:00:00.000+00:00", "number": "8", "summary": "Version nicht vorhanden" }, { "date": "2016-05-11T22:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2016-05-11T22:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2016-05-30T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2016-11-15T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-12-04T23:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2017-03-05T23:00:00.000+00:00", "number": "14", "summary": "Fixed a typo" }, { "date": "2017-03-05T23:00:00.000+00:00", "number": "15", "summary": "Version nicht vorhanden" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-06-15T22:00:00.000+00:00", "number": "17", "summary": "Korrektur" }, { "date": "2023-07-03T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Open Source Perl", "product": { "name": "Open Source Perl", "product_id": "T002190", "product_identification_helper": { "cpe": "cpe:/a:perl:perl:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server 7", "product": { "name": "Red Hat Enterprise Linux Server 7", "product_id": "T003550", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS 7.2", "product": { "name": "Red Hat Enterprise Linux Server AUS 7.2", "product_id": "T007127", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:v.7.2:aus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS 7.2", "product": { "name": "Red Hat Enterprise Linux Server EUS 7.2", "product_id": "T007218", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.2:eus" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "F5 ARX 6.0.0 - 6.4.0", "product": { "name": "F5 ARX 6.0.0 - 6.4.0", "product_id": "T006043", "product_identification_helper": { "cpe": "cpe:/a:f5:arx:6.0.0_-_6.4.0" } } }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Access Policy Manager 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Access Policy Manager 11.0.0 - 11.6.0", "product_id": "T005273", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_access_policy_manager:11.0.0_-_11.6.0" } } }, { "category": "product_name", "name": "F5 BIG-IP Access Policy Manager 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Access Policy Manager 10.1.0 - 10.2.4", "product_id": "T005274", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_access_policy_manager:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Access Policy Manager 12.0.0", "product": { "name": "F5 BIG-IP Access Policy Manager 12.0.0", "product_id": "T005931", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_access_policy_manager:12.0.0" } } } ], "category": "product_name", "name": "big-ip_access_policy_manager" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Analytics 12.0.0", "product": { "name": "F5 BIG-IP Analytics 12.0.0", "product_id": "T005928", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_analytics:12.0.0" } } }, { "category": "product_name", "name": "F5 BIG-IP Analytics 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Analytics 11.0.0 - 11.6.0", "product_id": "T006030", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_analytics:11.0.0_-_11.6.0" } } } ], "category": "product_name", "name": "big-ip_analytics" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Application Security Manager 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Application Security Manager 10.1.0 - 10.2.4", "product_id": "T005275", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Application Security Manager 12.0.0", "product": { "name": "F5 BIG-IP Application Security Manager 12.0.0", "product_id": "T005932", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:12.0.0" } } }, { "category": "product_name", "name": "F5 BIG-IP Application Security Manager 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Application Security Manager 11.0.0 - 11.6.0", "product_id": "T006028", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:11.0.0_-_11.6.0" } } } ], "category": "product_name", "name": "big-ip_application_security_manager" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Edge Gateway 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Edge Gateway 10.1.0 - 10.2.4", "product_id": "T004838", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_edge_gateway:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Edge Gateway 11.0.0 - 11.3.0", "product": { "name": "F5 BIG-IP Edge Gateway 11.0.0 - 11.3.0", "product_id": "T005276", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_edge_gateway:11.0.0_-_11.3.0" } } } ], "category": "product_name", "name": "big-ip_edge_gateway" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Global Traffic Manager 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Global Traffic Manager 10.1.0 - 10.2.4", "product_id": "T003443", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_global_traffic_manager:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Global Traffic Manager 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Global Traffic Manager 11.0.0 - 11.6.0", "product_id": "T006029", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_global_traffic_manager:11.0.0_-_11.6.0" } } } ], "category": "product_name", "name": "big-ip_global_traffic_manager" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Link Controller 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Link Controller 10.1.0 - 10.2.4", "product_id": "T005277", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Link Controller 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Link Controller 11.0.0 - 11.6.0", "product_id": "T005278", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:11.0.0_-_11.6.0" } } }, { "category": "product_name", "name": "F5 BIG-IP Link Controller 12.0.0", "product": { "name": "F5 BIG-IP Link Controller 12.0.0", "product_id": "T005938", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:12.0.0" } } } ], "category": "product_name", "name": "big-ip_link_controller" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Local Traffic Manager 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Local Traffic Manager 10.1.0 - 10.2.4", "product_id": "T003442", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 BIG-IP Local Traffic Manager 11.0.0 - 11.6.0", "product": { "name": "F5 BIG-IP Local Traffic Manager 11.0.0 - 11.6.0", "product_id": "T004834", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:11.0.0_-_11.6.0" } } }, { "category": "product_name", "name": "F5 BIG-IP Local Traffic Manager 12.0.0", "product": { "name": "F5 BIG-IP Local Traffic Manager 12.0.0", "product_id": "T005927", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:12.0.0" } } } ], "category": "product_name", "name": "big-ip_local_traffic_manager" }, { "branches": [ { "category": "product_name", "name": "F5 Policy Enforcement Manager 11.3.0 - 11.6.0", "product": { "name": "F5 Policy Enforcement Manager 11.3.0 - 11.6.0", "product_id": "T004848", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_policy_enforcement_manager:11.3.0_-_11.6.0" } } }, { "category": "product_name", "name": "F5 Policy Enforcement Manager 12.0.0", "product": { "name": "F5 Policy Enforcement Manager 12.0.0", "product_id": "T006044", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_policy_enforcement_manager:12.0.0" } } } ], "category": "product_name", "name": "big-ip_policy_enforcement_manager" }, { "branches": [ { "category": "product_name", "name": "F5 WAN Optimization Manager 10.1.0 - 10.2.4", "product": { "name": "F5 WAN Optimization Manager 10.1.0 - 10.2.4", "product_id": "T005281", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_wan_optimization_manager:10.1.0_-_10.2.4" } } }, { "category": "product_name", "name": "F5 WAN Optimization Manager 11.0.0 - 11.3.0", "product": { "name": "F5 WAN Optimization Manager 11.0.0 - 11.3.0", "product_id": "T006027", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_wan_optimization_manager:11.0.0_-_11.3.0" } } } ], "category": "product_name", "name": "big-ip_wan_optimization_manager" }, { "branches": [ { "category": "product_name", "name": "F5 WebAccelerator 11.0.0 - 11.3.0", "product": { "name": "F5 WebAccelerator 11.0.0 - 11.3.0", "product_id": "T002025", "product_identification_helper": { "cpe": "cpe:/h:f5:big-ip_webaccelerator:11.0.0_-_11.3.0" } } }, { "category": "product_name", "name": "F5 WebAccelerator 10.1.0 - 10.2.4", "product": { "name": "F5 WebAccelerator 10.1.0 - 10.2.4", "product_id": "T003446", "product_identification_helper": { "cpe": "cpe:/h:f5:big-ip_webaccelerator:10.1.0_-_10.2.4" } } } ], "category": "product_name", "name": "big-ip_webaccelerator" }, { "category": "product_name", "name": "F5 Enterprise Manager 3.0.0 - 3.1.1", "product": { "name": "F5 Enterprise Manager 3.0.0 - 3.1.1", "product_id": "T005962", "product_identification_helper": { "cpe": "cpe:/a:f5:enterprise_manager:3.0.0_-_3.1.1" } } }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP Protocol Security Manager 11.0.0 - 11.4.1", "product": { "name": "F5 BIG-IP Protocol Security Manager 11.0.0 - 11.4.1", "product_id": "T002022", "product_identification_helper": { "cpe": "cpe:/a:f5:protocol_security_manager:11.0.0_-_11.4.1" } } }, { "category": "product_name", "name": "F5 BIG-IP Protocol Security Manager 10.1.0 - 10.2.4", "product": { "name": "F5 BIG-IP Protocol Security Manager 10.1.0 - 10.2.4", "product_id": "T005279", "product_identification_helper": { "cpe": "cpe:/a:f5:protocol_security_manager:10.1.0_-_10.2.4" } } } ], "category": "product_name", "name": "protocol_security_manager" } ], "category": "vendor", "name": "f5" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop 7", "product": { "name": "Red Hat Enterprise Linux Desktop 7", "product_id": "T003548", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:7" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node 7", "product": { "name": "Red Hat Enterprise Linux HPC Node 7", "product_id": "T003549", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node 7.2 EUS", "product": { "name": "Red Hat Enterprise Linux HPC Node 7.2 EUS", "product_id": "T007069", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:7.2:eus" } } } ], "category": "product_name", "name": "enterprise_linux_hpc_node" }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation 7", "product": { "name": "Red Hat Enterprise Linux Workstation 7", "product_id": "T003565", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:7" } } } ], "category": "vendor", "name": "redhat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5073", "notes": [ { "category": "description", "text": "Es existiert eine Heap Overflow Schwachstelle in der \"pcre\" Komponente von Perl bez\u00fcglich der Auswertung regul\u00e4rer Ausdr\u00fccke. Ein Angreifer kann durch geeignete Eingaben an betroffene Anwendungen Speicherinformationen auslesen." } ], "product_status": { "known_affected": [ "T007127", "T007069", "T003442", "T003443", "T002190", "T003565", "T005962", "T003446", "T004834", "T003548", "T003549", "T005927", "T004838", "T005928", "T006030", "398363", "T005281", "T005277", "T003550", "T005276", "T005279", "T006027", "T005278", "T006029", "T007218", "T006028", "T005932", "T005931", "T004848", "T005938", "T002207", "T000126", "T002025", "T005273", "T006043", "T002022", "T005275", "T005274", "T006044" ] }, "release_date": "2015-06-28T22:00:00Z", "title": "CVE-2015-5073" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.