CVE Reference: CVE-2010-1168

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2010-1168

Description:
The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

CVE Status:
Candidate

References:

ST
  1024062

SAID
  Secunia Advisory: SA40049
  Secunia Advisory: SA40052
  Secunia Advisory: SA42402

REDHAT
  http://www.redhat.com/support/errata/RHSA-2010-0458.html
  http://www.redhat.com/support/errata/RHSA-2010-0457.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9807
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7424

MLIST
  http://www.openwall.com/lists/oss-security/2010/05/20/5

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
  http://www.mandriva.com/security/advisories?name=MDVSA-2010:115

CONFIRM
  http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in
  http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
  http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html


Return to the previous page.