First published: Fri Apr 08 2016(Updated: )
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl 5.30.0 | <5.23.9 | |
Debian | =7.0 | |
Debian | =8.0 | |
Oracle Communications Billing and Revenue Management | =7.5 | |
Oracle Configuration Manager | <12.1.2.0.4 | |
Oracle Configuration Manager | =12.1.2.0.6 | |
Oracle Database | =11.2.0.4 | |
Oracle Database | =12.1.0.2 | |
Oracle Database | =12.2.0.1 | |
Oracle Database | =18c | |
Oracle Database | =19c | |
Oracle Enterprise Manager | =13.2.0.0.0 | |
Oracle Enterprise Manager | =13.3.0.0.0 | |
Oracle TimesTen In Memory Database | <18.1.2.1.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
SUSE Linux | =13.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2381 is classified as a moderate severity vulnerability.
To fix CVE-2016-2381, update your Perl version to 5.24.0 or later, or apply the relevant patches provided by your distribution.
CVE-2016-2381 affects systems using Perl versions up to 5.23.9 and various distributions like Debian 7.0, Debian 8.0, and Oracle Database.
CVE-2016-2381 is a security vulnerability that allows context-dependent attackers to bypass the taint protection mechanism in Perl.
As of now, there are no publicly known exploits specifically targeting CVE-2016-2381.