7.8
CWE
264
Advisory Published
Updated

CVE-2016-1238

First published: Tue Aug 02 2016(Updated: )

(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.

Credit: security@debian.org

Affected SoftwareAffected VersionHow to fix
Debian=8.0
Fedora=23
Fedora=24
Perl=1.0.15
Perl=1.0.16
Perl=5.000
Perl=5.000o
Perl=5.001
Perl=5.001n
Perl=5.002
Perl=5.002_01
Perl=5.003
Perl=5.003_01
Perl=5.003_02
Perl=5.003_03
Perl=5.003_04
Perl=5.003_05
Perl=5.003_07
Perl=5.003_08
Perl=5.003_09
Perl=5.003_10
Perl=5.003_11
Perl=5.003_12
Perl=5.003_13
Perl=5.003_14
Perl=5.003_15
Perl=5.003_16
Perl=5.003_17
Perl=5.003_18
Perl=5.003_19
Perl=5.003_20
Perl=5.003_21
Perl=5.003_22
Perl=5.003_23
Perl=5.003_24
Perl=5.003_25
Perl=5.003_26
Perl=5.003_27
Perl=5.003_28
Perl=5.003_90
Perl=5.003_91
Perl=5.003_92
Perl=5.003_93
Perl=5.003_94
Perl=5.003_95
Perl=5.003_96
Perl=5.003_97
Perl=5.003_97a
Perl=5.003_97b
Perl=5.003_97c
Perl=5.003_97d
Perl=5.003_97e
Perl=5.003_97f
Perl=5.003_97g
Perl=5.003_97h
Perl=5.003_97i
Perl=5.003_97j
Perl=5.003_98
Perl=5.003_99
Perl=5.003_99a
Perl=5.004
Perl=5.004_01
Perl=5.004_02
Perl=5.004_03
Perl=5.004_04
Perl=5.004_05
Perl=5.005
Perl=5.005_01
Perl=5.005_02
Perl=5.005_03
Perl=5.005_04
Perl=5.6
Perl=5.6.0
Perl=5.6.1
Perl=5.6.2
Perl=5.7.3
Perl=5.8
Perl=5.8.0
Perl=5.8.1
Perl=5.8.2
Perl=5.8.3
Perl=5.8.4
Perl=5.8.5
Perl=5.8.6
Perl=5.8.7
Perl=5.8.8
Perl=5.8.9
Perl=5.8.9-rc1
Perl=5.9.0
Perl=5.9.1
Perl=5.9.2
Perl=5.9.3
Perl=5.9.4
Perl=5.9.5
Perl=5.10
Perl=5.10.0
Perl=5.10.1
Perl=5.10.1-rc1
Perl=5.10.1-rc2
Perl=5.11.0
Perl=5.11.1
Perl=5.11.2
Perl=5.11.3
Perl=5.11.4
Perl=5.11.5
Perl=5.12.0
Perl=5.12.0-rc0
Perl=5.12.0-rc1
Perl=5.12.0-rc2
Perl=5.12.0-rc3
Perl=5.12.0-rc4
Perl=5.12.0-rc5
Perl=5.12.1
Perl=5.12.1-rc0
Perl=5.12.1-rc1
Perl=5.12.1-rc2
Perl=5.12.2
Perl=5.12.2-rc1
Perl=5.12.3
Perl=5.12.3-rc1
Perl=5.12.3-rc2
Perl=5.12.3-rc3
Perl=5.12.4
Perl=5.12.4-rc1
Perl=5.12.4-rc2
Perl=5.12.5
Perl=5.12.5-rc1
Perl=5.12.5-rc2
Perl=5.13.0
Perl=5.13.1
Perl=5.13.2
Perl=5.13.3
Perl=5.13.4
Perl=5.13.5
Perl=5.13.6
Perl=5.13.7
Perl=5.13.8
Perl=5.13.9
Perl=5.13.10
Perl=5.13.11
Perl=5.14.0
Perl=5.14.0-rc1
Perl=5.14.0-rc2
Perl=5.14.0-rc3
Perl=5.14.1
Perl=5.14.1-rc1
Perl=5.14.2
Perl=5.14.2-rc1
Perl=5.14.3
Perl=5.14.3-rc1
Perl=5.14.3-rc2
Perl=5.14.4
Perl=5.14.4-rc1
Perl=5.14.4-rc2
Perl=5.15.0
Perl=5.15.1
Perl=5.15.2
Perl=5.15.3
Perl=5.15.4
Perl=5.15.5
Perl=5.15.6
Perl=5.15.7
Perl=5.15.8
Perl=5.15.9
Perl=5.16.0
Perl=5.16.0-rc1
Perl=5.16.0-rc2
Perl=5.16.1
Perl=5.16.2
Perl=5.16.3
Perl=5.16.3-rc1
Perl=5.17.0
Perl=5.17.1
Perl=5.17.2
Perl=5.17.3
Perl=5.17.4
Perl=5.17.5
Perl=5.17.6
Perl=5.17.7
Perl=5.17.7.0
Perl=5.17.8
Perl=5.17.9
Perl=5.17.10
Perl=5.17.11
Perl=5.18.0
Perl=5.18.0-rc1
Perl=5.18.0-rc2
Perl=5.18.0-rc3
Perl=5.18.0-rc4
Perl=5.18.1
Perl=5.18.2
Perl=5.18.2-rc1
Perl=5.18.2-rc2
Perl=5.18.2-rc3
Perl=5.18.2-rc4
Perl=5.18.3
Perl=5.18.3-rc1
Perl=5.18.3-rc2
Perl=5.18.4
Perl=5.19.0
Perl=5.19.1
Perl=5.19.2
Perl=5.19.3
Perl=5.19.4
Perl=5.19.5
Perl=5.19.6
Perl=5.19.7
Perl=5.19.8
Perl=5.19.9
Perl=5.19.10
Perl=5.19.11
Perl=5.20.0
Perl=5.20.0-rc1
Perl=5.20.1
Perl=5.20.1-rc1
Perl=5.20.1-rc2
Perl=5.20.2
Perl=5.20.2-rc1
Perl=5.20.3
Perl=5.20.3-rc1
Perl=5.20.3-rc2
Perl=5.21.0
Perl=5.21.1
Perl=5.21.2
Perl=5.21.3
Perl=5.21.4
Perl=5.21.5
Perl=5.21.6
Perl=5.21.7
Perl=5.21.8
Perl=5.21.9
Perl=5.21.10
Perl=5.21.11
Perl=5.22.0
Perl=5.22.0-rc1
Perl=5.22.0-rc2
Perl=5.22.1
Perl=5.22.1-rc1
Perl=5.22.1-rc2
Perl=5.22.1-rc3
Perl=5.22.1-rc4
Perl=5.22.2
Perl=5.22.2-rc1
Perl=5.22.3-rc1
Perl=5.24.0
Perl=5.24.0-rc1
Perl=5.24.0-rc2
Perl=5.24.0-rc3
Perl=5.24.0-rc4
Perl=5.24.0-rc5
Perl=5.24.1-rc1
openSUSE=15.0
Apache SpamAssassin<3.4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2016-1238?

    CVE-2016-1238 is classified as a moderate severity vulnerability.

  • How do I fix CVE-2016-1238?

    To fix CVE-2016-1238, you should update your Perl packages to the latest versions that address this vulnerability.

  • What products are affected by CVE-2016-1238?

    CVE-2016-1238 impacts several versions of Perl and specific distributions such as Debian 8.0 and Fedora versions 23 and 24.

  • What are the potential impacts of CVE-2016-1238?

    The potential impacts of CVE-2016-1238 include denial of service and unauthorized access, depending on the context of the Perl applications in use.

  • Was CVE-2016-1238 disclosed publicly?

    Yes, CVE-2016-1238 was publicly disclosed and is documented in multiple security advisories.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203