First published: Wed Dec 11 2002(Updated: )
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
cpan Safe.pm | =2.0_7 | |
sun linux | =5.0.7 | |
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.5.17f | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.17 | |
SGI IRIX | =6.5.12 | |
SGI IRIX | =6.5.18f | |
SGI IRIX | =6.5.19f | |
SGI IRIX | =6.5.21f | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.5.21m | |
SGI IRIX | =6.5.19 | |
SGI IRIX | =6.5.17m | |
SGI IRIX | =6.5.20m | |
SGI IRIX | =6.5.15 | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =6.5.14 | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =6.5.19m | |
SGI IRIX | =6.5.20f | |
cpan Safe.pm | =2.0_6 | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.11 | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =6.5.18 | |
SGI IRIX | =6.5.18m | |
SGI IRIX | =6.5.22 | |
SGI IRIX | =6.5.13 | |
SGI IRIX | =6.5.16 | |
Xinuos UnixWare | =7.1.3 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =9.0 | |
SCO Open UNIX | =8.0 | |
Oracle Solaris SPARC | =9.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Xinuos UnixWare | =7.1.2 | |
Oracle Solaris SPARC | =8.0 | |
Red Hat Enterprise Linux | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1323 is considered a high severity vulnerability due to its potential to allow code execution outside of safe compartments.
To fix CVE-2002-1323, upgrade to Safe.pm version 2.0.8 or later which addresses this vulnerability.
Software using Safe.pm version 2.0.7 and earlier, particularly those deployed on Perl 5.8.0 and earlier, are affected by CVE-2002-1323.
Exploiting CVE-2002-1323 can lead to unauthorized access to the underlying system, allowing attackers to execute arbitrary code.
A temporary workaround for CVE-2002-1323 is to avoid using Safe::reval or Safe::rdo until the Safe.pm package has been upgraded.