Vulnerability CVE-2013-7284


Published: 2014-04-29

Description:
The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.

See advisories in our WLB2 database:
Topic
Author
Date
High
PlRPC Perl module pre-auth remote code execution weak crypto
Florian Weimer
09.01.2014

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Malcolm nooning -> Pirpc 

 References:
https://rt.cpan.org/Public/Bug/Display.html?id=90474
https://bugzilla.redhat.com/show_bug.cgi?id=1051108
https://bugzilla.redhat.com/show_bug.cgi?id=1030572
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734789
http://seclists.org/oss-sec/2014/q1/62
http://seclists.org/oss-sec/2014/q1/56

Copyright 2024, cxsecurity.com

 

Back to Top