First published: Wed Mar 24 2010(Updated: )
The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl | <3:5.8.5-53.el4 | 3:5.8.5-53.el4 |
redhat/perl | <4:5.8.8-32.el5_5.1 | 4:5.8.8-32.el5_5.1 |
Safe | =2.08 | |
Safe | =2.09 | |
Safe | =2.11 | |
Safe | =2.13 | |
Safe | =2.14 | |
Safe | =2.15 | |
Safe | =2.16 | |
Safe | =2.17 | |
Safe | =2.18 | |
Safe | =2.19 | |
Safe | =2.20 | |
Safe | =2.21 | |
Safe | =2.22 | |
Safe | =2.23 | |
Safe | =2.24 | |
Perl 5.30.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1168 allows attackers to bypass access restrictions in the Safe module for Perl, potentially leading to the injection and execution of arbitrary code.
To fix CVE-2010-1168, you should upgrade to Safe module version 2.25 or later.
CVE-2010-1168 affects Safe module versions before 2.25, including 2.08 through 2.24.
Perl versions 5.8.5-53.el4 and 5.8.8-32.el5_5.1 are among those that can have the vulnerability due to the affected Safe module.
The main attack vector for CVE-2010-1168 involves calling methods and using objects in a way that circumvents Safe module restrictions.