ID

VAR-200711-0540


CVE

CVE-2007-5116


TITLE

Perl Buffer Overflow Vulnerability in Regular Expression Engine

Trust: 0.8

sources: JVNDB: JVNDB-2007-000796

DESCRIPTION

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. Perl is prone to a buffer-overflow vulnerability because it fails to sufficiently bounds-check user-supplied input. This facilitates the remote compromise of affected computers. Perl 5.8 is vulnerable to this issue; other versions may also be affected. Perl is a free and powerful programming language. An error in the way Perl's regular expression engine calculates the space required to process regular expressions could allow a local attacker to elevate privileges. For the stable distribution (etch), this problem has been fixed in version 5.8.8-7etch1. For the old stable distribution (sarge), this problem has been fixed in version 5.8.4-8sarge6. For the unstable distribution (sid), this problem will be fixed soon. Some architectures are missing from this DSA; these updates will be released once they are available. We recommend that you upgrade your perl package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6.dsc Size/MD5 checksum: 1031 653d1eaa085e027d325a520653e9785c http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6.diff.gz Size/MD5 checksum: 103931 b8c617d86f3baa2cd35bde936c0a76d5 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4.orig.tar.gz Size/MD5 checksum: 12094233 912050a9cb6b0f415b76ba56052fb4cf Architecture independent components: http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.4-8sarge6_all.deb Size/MD5 checksum: 38810 ff950bde09387a4023efff595fcb7b80 http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.4-8sarge6_all.deb Size/MD5 checksum: 7049010 803d0a25ddd6d3a75769b39fd44c1b21 http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.4-8sarge6_all.deb Size/MD5 checksum: 2178698 8f6bbe7db6414444fd5dbfb7786e6b76 Alpha architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 804866 47b0bbfc0d2544132ac23e7bbd6fd81f http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 1008 dddcaa51b3b5b67c881b49a996e83944 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 3902134 e2170d1b691a118df3a3277e6f4b0af9 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 874688 bdb3fc1c1e0bed8bc37292f12ec9e803 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 4132780 e2539f2b62fd1a394f5424a534e9a51d http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_alpha.deb Size/MD5 checksum: 37086 dd82f2321b96bc531e16857848bece42 AMD64 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 605148 b613969a68e576543f18f56b1956e78e http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 1000 613477a3ba3f93013fa7a7776022d8e9 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 3834172 7f354043d2e7bbee72c710982e4f9074 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 791816 3541cf654fc59dd564c7af6642fae4df http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 3935362 38fb00c40a25985bf22cfe9805543349 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_amd64.deb Size/MD5 checksum: 32846 2f8cd32f087f60c61457f73f75fe3781 ARM architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 613158 30cd5528198d49208274e50e60611b0a http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 1026 fc64aa8b67f46fcccb6d85db7cb242ad http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 3132808 226a69d4fa30d1e0a40f4d761826c230 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 737524 b4aaf84bd60fef147d1131c5ffbc6a0a http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 3719460 8e8d12058f9f7fb9e153d4c3ff79d0f4 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_arm.deb Size/MD5 checksum: 29880 faa9dc0401eb667e202e12f2d2cf9643 HP Precision architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 654704 4efe04a8f2a81c81860148da029a88a8 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 1006 5081a0e11c583460919427c5b0c99a0d http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 3922234 a2b4f6549b23dd3a6c11ff97b6377d3d http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 867856 0955f80a504eb620dbab22129fe96dd3 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 3910388 59e8e003f4d65c3e42785226c90d5466 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_hppa.deb Size/MD5 checksum: 34496 46aee518b3411566edf62ea822e0edfd Intel IA-32 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 567034 2edc13b9a19f6291bb300bcc28b815bd http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 508698 9f275f4137b40e5cd465e3073527ad34 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 3239308 bd4934402fadbd7c6c6c00260a4ecb88 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 753218 4f70cd1586e664189be02a84247efe5d http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 3736626 8710f57842322a711abf6161f57e9bc1 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_i386.deb Size/MD5 checksum: 31706 d4e08f75b79d3bb75b4bdea55d668b6f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 866526 1f01d28dbc0d3fac81fbf120d048896a http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 1000 07c5c9823c9ff29b96ce76c63e4dfd16 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 4027978 0919c0c823170c46578a52df90f69cfc http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 1046706 7f724a26677aa52c39182a5109bd3bf9 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 4534722 9a16fed74de4e2e0c43b1135c15df9d3 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_ia64.deb Size/MD5 checksum: 50106 e73b65a4b267ca99ba48ef64de4dfdc1 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 457778 f25f1ebbbb4a5ce7b7a4a79c6256987e http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 1040 9882ea5db94e569a35209a66c74bb390 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 3815032 321dd2b80abad424b678f260d18f323a http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 692196 733bfa10857d842bd907f408b03a8b3d http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 3008672 81a0d0613ebe7b9affcd56174e1f955c http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_m68k.deb Size/MD5 checksum: 27934 68de12bace4cf3de7a339b25119b1611 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 657066 7e2c9980c630b3aa1e60348a4998665a http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 1032 3da5c1e82b6194beac8fe7020a38d7a3 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 3384320 edfa53822abb7626b2bfd6ac4d5923df http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 781078 f4a7b2e1bbd95c9381503b382d35ba58 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 4017490 ddca3a084b7c9f1b841bd3f93e39a1d0 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mips.deb Size/MD5 checksum: 32314 51f707f1c1d3df1c3ad05dc545512c10 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 653134 bbb4600b3f9f2512fe9a9233bd06370e http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 1008 42770abda5e92de95a180097e8588304 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 3125468 db2214e0762dab59ebe7237fbe8d80b2 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 781866 c3b6aa7d16d60fc0a083601801d57cdd http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 3967958 2d941edd8a70f1461f4bc7ec9b97a396 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_mipsel.deb Size/MD5 checksum: 32426 c16e24f77488ab690b9c73d33e9fd7be PowerPC architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 624852 fc0e31770a095b3180e8d29daac7ccc7 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 988 5668a4e4abcab40b924c2855c4c34f62 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 3509282 9e72e0a6a0d0108d701e9071e0ed4c3b http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 790186 fa6005f52c5a101e053dc24e5247f025 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 3700840 fe73cfba8f036b63839141d4a0564d49 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_powerpc.deb Size/MD5 checksum: 33564 e6d5ea2116ea4f5332c1ce887aa9b727 IBM S/390 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 604302 92d8311292f70764bafc0b015818d39d http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 996 8870e77ca4719c8cc1c67f6ac15ee36c http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 3819836 84eed51f2f162825d3bda29af8ddb203 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 800590 ee302b41b1d011e089cb43db508415ef http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 4235554 367b0ca68cd88842507c781cbb0e1f84 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_s390.deb Size/MD5 checksum: 33240 54ef9ae270587bb4c88f0e2b25d73347 Sun Sparc architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 582166 027797bd12344393503ebae3344dfd43 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 1006 4183b345e38cd2dcbca8c24cf3d02918 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 3547444 716f93769b9aa9c442044f9fe96c77c7 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 775850 6ef7c40ecdd6e08dbb37d0c02f8c89a2 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 3840628 e665c9ff077083f5719b7574e24fae05 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_sparc.deb Size/MD5 checksum: 31038 64fcafc906130c016eb45f2394c5b4a8 Debian GNU/Linux 4.0 alias etch - ------------------------------- Source archives: http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1.dsc Size/MD5 checksum: 1033 92799d6842afb4c5a9cbf483591b2c36 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1.diff.gz Size/MD5 checksum: 93005 caec226784d13b4108af359206f4dfe9 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8.orig.tar.gz Size/MD5 checksum: 12829188 b8c118d4360846829beb30b02a6b91a7 Architecture independent components: http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.8-7etch1_all.deb Size/MD5 checksum: 40906 ac1a3065102a3bb7920a976833f1d3cc http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.8-7etch1_all.deb Size/MD5 checksum: 7348690 c36b83c80b2c35515f3e6dec6451fda1 http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.8-7etch1_all.deb Size/MD5 checksum: 2313532 915e64aecc9e15678125def5267ea809 Alpha architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 821314 682e53e9c6736c48e31ea26e8697c870 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 1016 252a644a15275db90c1a9273e6f3b854 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 4135606 4925efac08f96859a7c8b47b886e0533 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 877900 03dce75ac1f4c9765a24f6f25ba01251 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 2928420 1a9ab7809416b7cfc068180646414576 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_alpha.deb Size/MD5 checksum: 36248 927d991a17103561f701fb56d512279d AMD64 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 630480 cdfbd258b8ee105250f389c3adfdc16e http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 1010 101f7c5357740b63a670ae874a3a498a http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 4238220 a2a9c0db784cc91e249f23e5564207bd http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 808804 469c3fd8e358d917225dd49f987bbf8d http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 2734912 d34da61c02d263e230b55f911d2dc748 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_amd64.deb Size/MD5 checksum: 32798 afac9013d139c7ab1276f50cc35f4512 ARM architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_arm.deb Size/MD5 checksum: 561934 9739f475931e29fb26e23873df727e04 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_arm.deb Size/MD5 checksum: 1018 77926e3d601fe1ed9bd75ef5a854d4e4 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_arm.deb Size/MD5 checksum: 3412144 73c5f41073926ea641d06032b0c5d228 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_arm.deb Size/MD5 checksum: 760246 574a68af0f13bc1a80d97c0eaa9ca4fc http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_arm.deb Size/MD5 checksum: 2545942 7fb21c951bfd70b24e9b63a4025059f4 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_arm.deb Size/MD5 checksum: 30358 ed5a223824e775a2e37b8e492e25abcb HP Precision architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 693944 441ce7894fc9d46c3a285b8681097a24 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 1014 068b7030ce2e74328a567f560690e208 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 4192184 916514f48c2d5ab511aac0c9d878d133 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 868288 7eb4c3e38c25285bc6a0ab6dc5a1d770 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 2735540 ff004f914a26621775d0247834e78cae http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_hppa.deb Size/MD5 checksum: 33210 c035eeb23dc4a1e04444065ae75f7b24 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_i386.deb Size/MD5 checksum: 585382 a27a344126f78b50c6874887ba8a7dec http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_i386.deb Size/MD5 checksum: 526956 2ae05903f4a08189e5319c4ca869828a http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_i386.deb Size/MD5 checksum: 3578468 e6a886c21a58d96083d0385ef602df75 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_i386.deb Size/MD5 checksum: 762180 e7d2c75b547db6c71e77395461c62e82 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_i386.deb Size/MD5 checksum: 2491880 f01678cc32a118929a22ee765ccd4768 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_i386.deb Size/MD5 checksum: 32094 56c5c6dded2172596d6bbea68d94068e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 977484 94fd1bb72f48559786abedc8b0ea6107 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 1006 9272b8f38e0b68c7143401bbe0dd10b3 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 4335608 4caae66d357b7c8f6a9d3b6ec1b98ac1 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 1153272 e61d597589339745c714ada2fa54d397 http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 3364174 d31a368b96392b89af59fbb529c81d20 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_ia64.deb Size/MD5 checksum: 51270 84b6fde3b7ed1898b59267b994efb4ff Little endian MIPS architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 687114 8973b906567dd752c73039a89dcb14ee http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 1012 47029166d1e495ad05a251d4946fbdc2 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 3413386 5ff0e279c6934b01d4bf163a5b171584 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 784352 dece00126cd1cf8c07ec673bd8043e6d http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 2729528 194373b4343008cc33b345744b7935fa http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_mipsel.deb Size/MD5 checksum: 32336 98092e70a5ea30153ec32f1d87cde1e4 PowerPC architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 653158 7b39e1fb1a940e19ebe4e9df9f6c1abb http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 1010 4f68cd00058bfe50e5353cc2f1027e30 http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 3824518 514b283d68bdb8ab5f8211b86fba6dd7 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 810514 54511356fc749a7518d6339d4832ab3e http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 2709230 f62606ee2641c529eed8d6f2aff8489e http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_powerpc.deb Size/MD5 checksum: 32902 de438d275e8c95f5dba5096386f3bdbd Sun Sparc architecture: http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 594254 32f78d47a9fdb90ac99363642330cea5 http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 1012 b4cdde1e439f59c484701a503271f3ba http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 3796708 d85383c57b38d1da74f5d4fed6e33c02 http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 783042 675e8693a697b670936108a3baeded7f http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 2565704 7419d49d4b7ac54b849d432177a3ff36 http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_sparc.deb Size/MD5 checksum: 31072 40d9e6abb0fd11019912c4877c8bf3ac These files will probably be moved into the stable distribution on its next update. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: AMD64 x86 emulation base libraries: Multiple vulnerabilities Date: December 12, 2014 Bugs: #196865, #335508, #483632, #508322 ID: 201412-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in AMD64 x86 emulation base libraries, the worst of which may allow remote execution of arbitrary code. Background ========== AMD64 x86 emulation base libraries provides pre-compiled 32-bit libraries. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/emul-linux-x86-baselibs < 20140406-r1 >= 20140406-r1 Description =========== Multiple vulnerabilities have been discovered in AMD64 x86 emulation base libraries. Please review the CVE identifiers referenced below for details. Impact ====== A context-dependent attacker may be able to execute arbitrary code, cause a Denial of Service condition, or obtain sensitive information. Workaround ========== There is no known workaround at this time. Resolution ========== All users of the AMD64 x86 emulation base libraries should upgrade to the latest version: # emerge --sync # emerge -1av ">=app-emulation/emul-linux-x86-baselibs-20140406-r1" NOTE: One or more of the issues described in this advisory have been fixed in previous updates. They are included in this advisory for the sake of completeness. It is likely that your system is already no longer affected by them. References ========== [ 1 ] CVE-2007-0720 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720 [ 2 ] CVE-2007-1536 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536 [ 3 ] CVE-2007-2026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026 [ 4 ] CVE-2007-2445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445 [ 5 ] CVE-2007-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741 [ 6 ] CVE-2007-3108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108 [ 7 ] CVE-2007-4995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995 [ 8 ] CVE-2007-5116 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116 [ 9 ] CVE-2007-5135 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135 [ 10 ] CVE-2007-5266 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266 [ 11 ] CVE-2007-5268 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268 [ 12 ] CVE-2007-5269 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269 [ 13 ] CVE-2007-5849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849 [ 14 ] CVE-2010-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205 [ 15 ] CVE-2013-0338 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338 [ 16 ] CVE-2013-0339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339 [ 17 ] CVE-2013-1664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664 [ 18 ] CVE-2013-1969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969 [ 19 ] CVE-2013-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877 [ 20 ] CVE-2014-0160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-11.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2008-0001 Synopsis: Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages Issue date: 2008-01-07 Updated on: 2008-01-07 CVE numbers: CVE-2007-5360 CVE-2007-5398 CVE-2007-4572 CVE-2007-5191 CVE-2007-5116 CVE-2007-3108 CVE-2007-5135 - ------------------------------------------------------------------- 1. Summary: Updated service console patches 2. Relevant releases: ESX Server 3.0.2 without patches ESX-1002969, ESX-1002970, ESX-1002971, ESX-1002975, ESX-1002976 ESX Server 3.0.1 without patches ESX-1002962, ESX-1002963, ESX-1002964, ESX-1002968, ESX-1002972, ESX-1003176 3. Problem description: I OpenPegasus PAM Authentication Buffer Overflow Alexander Sotirov from VMware Security Research discovered a buffer overflow vulnerability in the OpenPegasus Management server. This flaw could be exploited by a malicious remote user on the service console network to gain root access to the service console. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5360 to this issue. RPM Updated: pegasus-2.5-552927 VM Shutdown: No Host Reboot: No Note: ESX Server 3.5 and ESX Server 3i are not affected by this issue. ESX Server 3.0.2 http://download3.vmware.com/software/vi/ESX-1002970.tgz md5sum: d19115e965d486e72100ce489efea707 http://kb.vmware.com/kb/1002970 ESX Server 3.0.1 http://download3.vmware.com/software/vi/ESX-1003176.tgz md5sum: 5674ca0dcfac90726014cc316444996e http://kb.vmware.com/kb/1003176 ESX Server 2.5.x Users should remove the OpenPegasus CIM Management rpm. This component is disabled by default, and VMware recommends that you do not use this component of ESX Server 2.x. If you want to use the CIM functionality, upgrade to ESX Server 3.0.1 or a later release. Note: This vulnerability can be exploited remotely only if the attacker has access to the service console network. Security best practices provided by VMware recommend that the service console be isolated from the VM network. Please see http://www.vmware.com/resources/techresources/726 for more information on VMware security best practices. II Service Console package security updates a. Updated Samba package An issue where attackers on the service console management network can cause a stack-based buffer overflow in the reply_netbios_packet function of nmbd in Samba. On systems where Samba is being used as a WINS server, exploiting this vulnerability can allow remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request. An issue where attackers on the service console management network can exploit a vulnerability that occurs when Samba is configured as a Primary or Backup Domain controller. The vulnerability allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-5398 and CVE-2007-4572 to these issues. Note: By default Samba is not configured as a WINS server or a domain controller and ESX is not vulnerable unless the administrator has changed the default configuration. This vulnerability can be exploited remotely only if the attacker has access to the service console network. Security best practices provided by VMware recommend that the service console be isolated from the VM network. Please see http://www.vmware.com/resources/techresources/726 for more information on VMware security best practices. RPM Updated: samba-3.0.9-1.3E.14.1vmw samba-client-3.0.9-1.3E.14.1vmw samba-common-3.0.9-1.3E.14.1vmw VM Shutdown: Yes Host Reboot: Yes ESX Server 3.5.0 is not affected by this issue ESX Server 3.0.2 http://download3.vmware.com/software/vi/ESX-1002975.tgz md5sum: 797a7494c2c4eb49629d3f94818df5dd http://kb.vmware.com/kb/1002975 ESX Server 3.0.1 http://download3.vmware.com/software/vi/ESX-1002968.tgz md5sum: 5106d90afaf77c3a0d8433487f937d06 http://kb.vmware.com/kb/1002968 ESX Server 2.5.5 download Upgrade Patch 3 ESX Server 2.5.4 download Upgrade Patch 14 b. Updated util-linux package The patch addresses an issue where the mount and umount utilities in util-linux call the setuid and setgid functions in the wrong order and do not check the return values, which could allow attackers to gain elevated privileges via helper application such as mount.nfs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5191 to this issue. RPM Updated: util-linux-2.11y-31.24vmw losetup-2.11y-31.24vmw mount -2.11y-31.24vmw VM Shutdown: Yes Host Reboot: Yes ESX Server 3.0.2 http://download3.vmware.com/software/vi/ESX-1002976.tgz md5sum: 0fe833c50c0ecb0ff9340d6674be2e43 http://kb.vmware.com/kb/1002976 ESX Server 3.0.1 http://download3.vmware.com/software/vi/ESX-1002972.tgz md5sum: 59ca4a43f330c5f0b7a55693aa952cdc http://kb.vmware.com/kb/1002972 c. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5116 to this issue. RPM Updated: perl-5.8.0-97.EL3 VM Shutdown: Yes Host Reboot: Yes ESX Server 3.0.2 http://download3.vmware.com/software/vi/ESX-1002971.tgz md5sum: 337b09d9ae4b1694a045e216b69765e1 http://kb.vmware.com/kb/1002971 ESX Server 3.0.1 http://download3.vmware.com/software/vi/ESX-1002964.tgz md5sum: d47e26104bfd5e4018ae645638c94487 http://kb.vmware.com/kb/1002964 d. Updated OpenSSL package A flaw in the SSL_get_shared_ciphers() function can allow an attacker to cause a buffer overflow problem by sending ciphers to applications that use the function. A possible vulnerability that would allow a local attacker to obtain private RSA keys being used on a system using the OpenSSL package. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-3108, and CVE-2007-5135 to these issues. RPM Updated: openssl-0.9.7a-33.24 VM Shutdown: Yes Host Reboot: Yes ESX Server 3.0.2 http://download3.vmware.com/software/vi/ESX-1002969.tgz md5sum: 72fd28a9f9380158db149259fbdcaa3b http://kb.vmware.com/kb/1002969 ESX Server 3.0.1 http://download3.vmware.com/software/vi/ESX-1002962.tgz md5sum: a0727bdc2e1a6f00d5fe77430a6ee9d6 http://kb.vmware.com/kb/1002962 ESX Server 2.5.5 download Upgrade Patch 3 ESX Server 2.5.4 download Upgrade Patch 14 4. Solution: Please review the Patch notes for your product and version and verify the md5sum of your downloaded file. ESX Server 3.x Patches: http://www.vmware.com/download/vi/vi3_patches.html ESX Server 2.x Patches: http://www.vmware.com/download/esx/esx2_patches.html ESX Server 2.5.5 Upgrade Patch 3 http://download3.vmware.com/software/esx/esx-2.5.5-65742-upgrade.tar.gz md5sum: 9068250fdd604e8787ef40995a4638f9 http://www.vmware.com/support/esx25/doc/esx-255-200712-patch.html ESX Server 2.5.4 Upgrade Patch 14 http://download3.vmware.com/software/esx/esx-2.5.4-65752-upgrade.tar.gz md5sum: 24990b9207f882ccc91545b6fc90273d http://www.vmware.com/support/esx25/doc/esx-254-200712-patch.html 5. References: CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 - ------------------------------------------------------------------- 6. Contact: E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce@lists.vmware.com * bugtraq@securityfocus.com * full-disclosure@lists.grok.org.uk E-mail: security@vmware.com Security web site http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2008 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHgtXJS2KysvBH1xkRCPnYAJoDMpdOmgs4e+JQ610SCjnKF99wpgCfcVO3 UCcAvs574f1LCZv+8lPQvrk= =Hzno -----END PGP SIGNATURE----- . Updated packages have been patched to prevent these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: 7dee97092269465ccb5de0f35321ab13 2007.0/i586/perl-5.8.8-7.1mdv2007.0.i586.rpm efd626e1f1efd248e6c6570e88a599c3 2007.0/i586/perl-base-5.8.8-7.1mdv2007.0.i586.rpm 62b10d28a5abc05d3b8cd35c7f68e8aa 2007.0/i586/perl-devel-5.8.8-7.1mdv2007.0.i586.rpm 3a9dc19143ab6a27713fdeb6665d8d76 2007.0/i586/perl-doc-5.8.8-7.1mdv2007.0.i586.rpm 60b511580ae4f514434dd111efa42872 2007.0/i586/perl-suid-5.8.8-7.1mdv2007.0.i586.rpm 08e44392992b4ab983bf85debb8be462 2007.0/SRPMS/perl-5.8.8-7.1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: be33f079454aec3b88f21716dfacf8d6 2007.0/x86_64/perl-5.8.8-7.1mdv2007.0.x86_64.rpm 5a82850218434119c3f55047b3068213 2007.0/x86_64/perl-base-5.8.8-7.1mdv2007.0.x86_64.rpm 4f995ed4fa46f2bf79a427d9341e895b 2007.0/x86_64/perl-devel-5.8.8-7.1mdv2007.0.x86_64.rpm e949a7e20661c6c5f4c4511f25196ff6 2007.0/x86_64/perl-doc-5.8.8-7.1mdv2007.0.x86_64.rpm a3df44cc0b957b02bfcab3eed98542dd 2007.0/x86_64/perl-suid-5.8.8-7.1mdv2007.0.x86_64.rpm 08e44392992b4ab983bf85debb8be462 2007.0/SRPMS/perl-5.8.8-7.1mdv2007.0.src.rpm Mandriva Linux 2007.1: efb800025ab3001b90af0e16e5a49886 2007.1/i586/perl-5.8.8-10.1mdv2007.1.i586.rpm 515beec177dd5a0418090016ae357274 2007.1/i586/perl-base-5.8.8-10.1mdv2007.1.i586.rpm ae79195a6f27e44fd4ff7899497cf948 2007.1/i586/perl-devel-5.8.8-10.1mdv2007.1.i586.rpm f721306e820d4c66db3466917cde67f9 2007.1/i586/perl-doc-5.8.8-10.1mdv2007.1.i586.rpm 85a219e5b2c3788841024be8d81b2cac 2007.1/i586/perl-suid-5.8.8-10.1mdv2007.1.i586.rpm 9b22a92ec4a3dc898a12bbb80ada4de2 2007.1/SRPMS/perl-5.8.8-10.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 1a17302f843293a5dc0063fe3e4549c0 2007.1/x86_64/perl-5.8.8-10.1mdv2007.1.x86_64.rpm c85ba481d517ec81c54eea5bc7064405 2007.1/x86_64/perl-base-5.8.8-10.1mdv2007.1.x86_64.rpm 5d3b84a1444339a83058bc3493506d22 2007.1/x86_64/perl-devel-5.8.8-10.1mdv2007.1.x86_64.rpm 005d395a8717bd5af248820eb01cc1d8 2007.1/x86_64/perl-doc-5.8.8-10.1mdv2007.1.x86_64.rpm f6c966ea032f921f033934d1f894b96b 2007.1/x86_64/perl-suid-5.8.8-10.1mdv2007.1.x86_64.rpm 9b22a92ec4a3dc898a12bbb80ada4de2 2007.1/SRPMS/perl-5.8.8-10.1mdv2007.1.src.rpm Mandriva Linux 2008.0: 6e84010549818c839e91034391b79f4f 2008.0/i586/perl-5.8.8-12.1mdv2008.0.i586.rpm f09541f2caf348aee64161cecdf7276e 2008.0/i586/perl-base-5.8.8-12.1mdv2008.0.i586.rpm dce7ae7aba1d356fd366075b67478493 2008.0/i586/perl-devel-5.8.8-12.1mdv2008.0.i586.rpm b3169afea74fd707021d03410172b6c0 2008.0/i586/perl-doc-5.8.8-12.1mdv2008.0.i586.rpm 78585fde0ad5b02f3e7c0f01d31a1ccf 2008.0/i586/perl-suid-5.8.8-12.1mdv2008.0.i586.rpm 584ad050342c7136e161fc48d29398bf 2008.0/SRPMS/perl-5.8.8-12.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 6ee9071cb1b0a6f38e731b1cd9a421e7 2008.0/x86_64/perl-5.8.8-12.1mdv2008.0.x86_64.rpm d7bd85fb101d94bf1dc84bcf817533d7 2008.0/x86_64/perl-base-5.8.8-12.1mdv2008.0.x86_64.rpm 031487e27d7f2a12003efe8ab714a096 2008.0/x86_64/perl-devel-5.8.8-12.1mdv2008.0.x86_64.rpm 3c1846b134cbd1461ffd291a95f6e2d2 2008.0/x86_64/perl-doc-5.8.8-12.1mdv2008.0.x86_64.rpm 99f545fefe35f45b5d90d2f98fe14da5 2008.0/x86_64/perl-suid-5.8.8-12.1mdv2008.0.x86_64.rpm 584ad050342c7136e161fc48d29398bf 2008.0/SRPMS/perl-5.8.8-12.1mdv2008.0.src.rpm Corporate 3.0: 9388a0766403e1accc6afc3d963960ba corporate/3.0/i586/perl-5.8.3-5.6.C30mdk.i586.rpm a67623fb7d2e4e18ca8976c64e43a4ca corporate/3.0/i586/perl-base-5.8.3-5.6.C30mdk.i586.rpm 9068ad50c3e10c29940bb071651a8d4d corporate/3.0/i586/perl-devel-5.8.3-5.6.C30mdk.i586.rpm a8a2e1b1963c212e4644c320f27c71d3 corporate/3.0/i586/perl-doc-5.8.3-5.6.C30mdk.i586.rpm 15b73b73ea6dd0de1100e1445690c034 corporate/3.0/SRPMS/perl-5.8.3-5.6.C30mdk.src.rpm Corporate 3.0/X86_64: f2f7445b49d5d7afa7b3766d71bdf65f corporate/3.0/x86_64/perl-5.8.3-5.6.C30mdk.x86_64.rpm ef5dabb99fdbe28068089eba1fd8bcc4 corporate/3.0/x86_64/perl-base-5.8.3-5.6.C30mdk.x86_64.rpm 4a5a04a330db20f460229aa69ded5e95 corporate/3.0/x86_64/perl-devel-5.8.3-5.6.C30mdk.x86_64.rpm 2bc06d931706f57fa946822f9396ffd6 corporate/3.0/x86_64/perl-doc-5.8.3-5.6.C30mdk.x86_64.rpm 15b73b73ea6dd0de1100e1445690c034 corporate/3.0/SRPMS/perl-5.8.3-5.6.C30mdk.src.rpm Corporate 4.0: e158109794ad5e71bc02f41adec150e1 corporate/4.0/i586/perl-5.8.7-3.3.20060mlcs4.i586.rpm 03c680726cf01c3d8f25cb7d61d7bb10 corporate/4.0/i586/perl-base-5.8.7-3.3.20060mlcs4.i586.rpm 51f55a3998dbcf2e9abcf821ffb3026f corporate/4.0/i586/perl-devel-5.8.7-3.3.20060mlcs4.i586.rpm f936e8720be0d37223b8a97dc2ed2704 corporate/4.0/i586/perl-doc-5.8.7-3.3.20060mlcs4.i586.rpm b4068ddb2d92f4845c29a6b3ca8feef5 corporate/4.0/i586/perl-suid-5.8.7-3.3.20060mlcs4.i586.rpm 3b23f4612d0a011d50c5eb6960ffa5c4 corporate/4.0/SRPMS/perl-5.8.7-3.3.20060mlcs4.src.rpm Corporate 4.0/X86_64: c42250a8c42a0e349102ff977c6659cc corporate/4.0/x86_64/perl-5.8.7-3.3.20060mlcs4.x86_64.rpm 82d2bcbda0229415464c10471f881517 corporate/4.0/x86_64/perl-base-5.8.7-3.3.20060mlcs4.x86_64.rpm 7f07eddd92d4c49b3ee5c32c69d52996 corporate/4.0/x86_64/perl-devel-5.8.7-3.3.20060mlcs4.x86_64.rpm 140b57c79fc305a52e13ce5550e7d05c corporate/4.0/x86_64/perl-doc-5.8.7-3.3.20060mlcs4.x86_64.rpm ec3007ca202716e0c3872c37141fc2cc corporate/4.0/x86_64/perl-suid-5.8.7-3.3.20060mlcs4.x86_64.rpm 3b23f4612d0a011d50c5eb6960ffa5c4 corporate/4.0/SRPMS/perl-5.8.7-3.3.20060mlcs4.src.rpm Multi Network Firewall 2.0: 8ea5d389e9ddd9ca2e1b78869ad14ca7 mnf/2.0/i586/perl-5.8.3-5.6.M20mdk.i586.rpm f53bd974980010568e5153578d628323 mnf/2.0/i586/perl-base-5.8.3-5.6.M20mdk.i586.rpm 1335c295512b38ea524e201c66551132 mnf/2.0/i586/perl-devel-5.8.3-5.6.M20mdk.i586.rpm 8e306b59ecbb8583d5c1e4e74ef62e34 mnf/2.0/i586/perl-doc-5.8.3-5.6.M20mdk.i586.rpm 7576ea8ec817978b4602f5bf4c3436c5 mnf/2.0/SRPMS/perl-5.8.3-5.6.M20mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHL9FBmqjQ0CJFipgRAhxaAJ44oWRrf/Q1Zj9q+HP4Y3pj9Y8XugCg398H Rl9c0TwvCe/HjAyI42+NhlU= =o1R+ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . b. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01362465 Version: 1 HPSBTU02311 SSRT080001 rev.1 - HP Tru64 UNIX running Perl, Remote Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2008-02-19 Last Updated: 2008-02-19 Potential Security Impact: Execution of Arbitrary Code Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified in Perl 5.8.7 and earlier running on HP Tru64 UNIX. References: CVE-2007-5116 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Tru64 UNIX v 5.1B-4 HP Tru64 UNIX v 5.1B-3 Internet Express (IX) for HP Tru64 UNIX v 6.7 BACKGROUND CVSS 2.0 Base Metrics Reference Base Vector Base Score CVE-2007-5116 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. RESOLUTION HP is releasing the following Early Release Patch (ERP) kits publicly for use by any customer until updates are available in mainstream release patch kits. The resolutions contained in the ERP kits are targeted for availability in the following mainstream kits: The Associated Products CD (APCD) associated with HP Tru64 UNIX v 5.1B-5 Internet Express (IX) for HP Tru64 UNIX v 6.8 The ERP kits use dupatch to install and will not install over any Customer Specific Patches (CSPs) that have file intersections with the ERPs. Contact your service provider for assistance if the installation of the ERPs is blocked by any of your installed CSPs. The ERP kits distribute the following items: Patched version of Perl v 5.8.8 including source code HP Tru64 UNIX Version v5.1B-4 PREREQUISITE: HP Tru64 UNIX v5.1B-4 PK6 (BL27) Name: perl_V51BB27-ES-20080207 Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=perl_V51BB27-ES-20080207 HP Tru64 UNIX Version v5.1B-3 PREREQUISITE: HP Tru64 UNIX v5.1B-3 PK5 (BL26) Name: perl_V51BB26-ES-20080204 Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001399-V51BB26-ES-20071207 Internet Express (IX) for HP Tru64 UNIX v 6.7 PREREQUISITE: HP Tru64 UNIX v5.1B-3 PK5 (BL26) or HP Tru64 UNIX v5.1B-3 PK5 (BL26) NOTE: Use the Perl patch kit appropriate to the operating system version MD5 checksums are available from the ITRC patch database main page. From the patch database main page, click Tru64 UNIX, then click verifying MD5 checksums under useful links. PRODUCT SPECIFIC INFORMATION HISTORY Version:1 (rev.1) - 19 February 2008 Initial release Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2008 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Trust: 2.52

sources: NVD: CVE-2007-5116 // JVNDB: JVNDB-2007-000796 // BID: 26350 // VULHUB: VHN-28478 // PACKETSTORM: 60738 // PACKETSTORM: 129524 // PACKETSTORM: 62401 // PACKETSTORM: 60703 // PACKETSTORM: 62911 // PACKETSTORM: 63867

AFFECTED PRODUCTS

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 1.1

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 1.1

vendor:ibmmodel:aixscope:eqversion:5.2

Trust: 1.1

vendor:larry wallmodel:perlscope:eqversion:5.8.4

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.6

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.3

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.5

Trust: 1.0

vendor:mandrakesoftmodel:mandrake multi network firewallscope:eqversion:2.0

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.2.3

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.1

Trust: 1.0

vendor:openpkgmodel:openpkgscope:eqversion:current

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.3

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.2

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.4.4

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.0

Trust: 1.0

vendor:larry wallmodel:perlscope:eqversion:5.8.1

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:1.0

Trust: 1.0

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.1

Trust: 0.8

vendor:red hatmodel:application stackscope:eqversion:v1 for enterprise linux es (v.4)

Trust: 0.8

vendor:the perlmodel:perlscope:eqversion:5.8.8

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:red hatmodel:application stackscope:eqversion:v1 for enterprise linux as (v.4)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:the perlmodel:perlscope:ltversion:version

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.1

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:mandrakesoftmodel:mandrake linux corporate serverscope:eqversion:3.0

Trust: 0.6

vendor:mandrakesoftmodel:mandrake linux corporate serverscope:eqversion:4.0

Trust: 0.6

vendor:vmwaremodel:esx serverscope:eqversion:3.0.2

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.1x86-64

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.1x86

Trust: 0.3

vendor:s u s emodel:linux ppcscope:eqversion:10.1

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.0x86-64

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.0x86

Trust: 0.3

vendor:s u s emodel:linux ppcscope:eqversion:10.0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:certificate serverscope:eqversion:7.3

Trust: 0.3

vendor:redhatmodel:application stack for enterprise linux esscope:eqversion:v14

Trust: 0.3

vendor:redhatmodel:application stack for enterprise linux asscope:eqversion:v14

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:redmodel:hat fedorascope:eqversion:7

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:novellmodel:linux posscope:eqversion:9

Trust: 0.3

vendor:novellmodel:linux desktopscope:eqversion:9

Trust: 0.3

vendor:nortelmodel:networks self-service peri workstationscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:nortelmodel:networks self-service ccss7scope:eqversion:-0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.7

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.6

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.5

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-5

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-4

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-3

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-2.3

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-2

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4-1

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.4

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.3

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.1

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8.0-88.3

Trust: 0.3

vendor:larrymodel:wall perlscope:eqversion:5.8

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.20

Trust: 0.3

vendor:hpmodel:tru64 b-4scope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:tru64 b-3scope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:internet expressscope:eqversion:6.7

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:foresightmodel:linux foresight linuxscope:eqversion:1.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:sesscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.21

Trust: 0.3

sources: BID: 26350 // JVNDB: JVNDB-2007-000796 // CNNVD: CNNVD-200711-104 // NVD: CVE-2007-5116

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5116
value: HIGH

Trust: 1.0

NVD: CVE-2007-5116
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200711-104
value: HIGH

Trust: 0.6

VULHUB: VHN-28478
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-5116
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28478
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28478 // JVNDB: JVNDB-2007-000796 // CNNVD: CNNVD-200711-104 // NVD: CVE-2007-5116

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-28478 // NVD: CVE-2007-5116

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 129524 // CNNVD: CNNVD-200711-104

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200711-104

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000796

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-28478

PATCH

title:Security Update 2007-009url:http://docs.info.apple.com/article.html?artnum=307179-en

Trust: 0.8

title:Security Update 2007-009url:http://docs.info.apple.com/article.html?artnum=307179-ja

Trust: 0.8

title:perl-5.8.8-10.2.1AXurl:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=74

Trust: 0.8

title:perl_ifix.tarurl:ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar

Trust: 0.8

title:4170url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4170

Trust: 0.8

title:IZ10244url:http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244

Trust: 0.8

title:perl (V3.0/V4.0)url:http://www.miraclelinux.com/support/update/list.php?errata_id=1178

Trust: 0.8

title:RHSA-2007:1011url:http://rhn.redhat.com/errata/RHSA-2007-1011.html

Trust: 0.8

title:RHSA-2007:0966url:https://rhn.redhat.com/errata/RHSA-2007-0966.html

Trust: 0.8

title:231524url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1

Trust: 0.8

title:Patch fixes buffer overflow in regexp compilerurl:http://use.perl.org/article.pl?sid=07/11/29/1432238

Trust: 0.8

title:Perl 5.8.9 releasedurl:http://use.perl.org/articles/08/12/16/1129216.shtml

Trust: 0.8

title:RHSA-2007:0966url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0966J.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000796

EXTERNAL IDS

db:NVDid:CVE-2007-5116

Trust: 3.4

db:BIDid:26350

Trust: 2.8

db:SECUNIAid:27546

Trust: 2.5

db:SECUNIAid:27531

Trust: 1.7

db:SECUNIAid:27479

Trust: 1.7

db:SECUNIAid:27515

Trust: 1.7

db:SECUNIAid:28387

Trust: 1.7

db:SECUNIAid:27936

Trust: 1.7

db:SECUNIAid:27548

Trust: 1.7

db:SECUNIAid:28167

Trust: 1.7

db:SECUNIAid:28368

Trust: 1.7

db:SECUNIAid:27756

Trust: 1.7

db:SECUNIAid:31208

Trust: 1.7

db:SECUNIAid:27570

Trust: 1.7

db:SECUNIAid:27613

Trust: 1.7

db:VUPENid:ADV-2007-3724

Trust: 1.7

db:VUPENid:ADV-2007-4238

Trust: 1.7

db:VUPENid:ADV-2007-4255

Trust: 1.7

db:SECTRACKid:1018899

Trust: 1.7

db:USCERTid:TA07-352A

Trust: 1.7

db:XFid:38270

Trust: 1.4

db:SECUNIAid:29074

Trust: 1.1

db:SECUNIAid:28993

Trust: 1.1

db:VUPENid:ADV-2008-0641

Trust: 1.1

db:VUPENid:ADV-2008-0064

Trust: 1.1

db:JVNDBid:JVNDB-2007-000796

Trust: 0.8

db:CONFIRMid:HTTP://DOCS.INFO.APPLE.COM/ARTICLE.HTML?ARTNUM=307179

Trust: 0.6

db:CONFIRMid:FTP://AIX.SOFTW

Trust: 0.6

db:AIXAPARid:IZ10220

Trust: 0.6

db:AIXAPARid:IZ10244

Trust: 0.6

db:APPLEid:APPLE-SA-2007-12-17

Trust: 0.6

db:BUGTRAQid:20080123 UPDATED VMSA-2008-0001.1 MODERATE OPENPEGASUS PAM AUTHENTICATION BUFFER OVERFLOW AND UPDATED SERVICE CONSOLE PACKAGES

Trust: 0.6

db:BUGTRAQid:20080108 VMSA-2008-0001 MODERATE OPENPEGASUS PAM AUTHENTICATION BUFFER OVERFLOW AND UPDATED SERVICE CONSOLE PACKAGES

Trust: 0.6

db:BUGTRAQid:20071112 FLEA-2007-0069-1 PERL

Trust: 0.6

db:BUGTRAQid:20071110 FLEA-2007-0063-1 PERL

Trust: 0.6

db:MANDRIVAid:MDKSA-2007:207

Trust: 0.6

db:GENTOOid:GLSA-200711-28

Trust: 0.6

db:DEBIANid:DSA-1400

Trust: 0.6

db:MLISTid:[SECURITY-ANNOUNCE] 20080107 VMSA-2008-0001 MODERATE OPENPEGASUS PAM AUTHENTICATION BUFFER OVERFLOW AND UPDATED SERVICE CONSOLE PACKAGES

Trust: 0.6

db:REDHATid:RHSA-2007:0966

Trust: 0.6

db:REDHATid:RHSA-2007:1011

Trust: 0.6

db:SUSEid:SUSE-SR:2007:024

Trust: 0.6

db:UBUNTUid:USN-552-1

Trust: 0.6

db:CERT/CCid:TA07-352A

Trust: 0.6

db:OPENPKGid:OPENPKG-SA-2007.023

Trust: 0.6

db:CNNVDid:CNNVD-200711-104

Trust: 0.6

db:PACKETSTORMid:63867

Trust: 0.2

db:PACKETSTORMid:60738

Trust: 0.2

db:PACKETSTORMid:60703

Trust: 0.2

db:PACKETSTORMid:61507

Trust: 0.1

db:PACKETSTORMid:61151

Trust: 0.1

db:PACKETSTORMid:60792

Trust: 0.1

db:VULHUBid:VHN-28478

Trust: 0.1

db:PACKETSTORMid:129524

Trust: 0.1

db:PACKETSTORMid:62401

Trust: 0.1

db:PACKETSTORMid:62911

Trust: 0.1

sources: VULHUB: VHN-28478 // BID: 26350 // JVNDB: JVNDB-2007-000796 // PACKETSTORM: 60738 // PACKETSTORM: 129524 // PACKETSTORM: 62401 // PACKETSTORM: 60703 // PACKETSTORM: 62911 // PACKETSTORM: 63867 // CNNVD: CNNVD-200711-104 // NVD: CVE-2007-5116

REFERENCES

url:http://www.securityfocus.com/bid/26350

Trust: 2.5

url:http://secunia.com/advisories/27546

Trust: 2.5

url:http://support.avaya.com/elmodocs2/security/asa-2008-014.htm

Trust: 2.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=323571

Trust: 2.0

url:http://www.ipcop.org/index.php?name=news&file=article&sid=41

Trust: 1.9

url:http://www-1.ibm.com/support/docview.wss?uid=isg1iz10220

Trust: 1.7

url:http://www-1.ibm.com/support/docview.wss?uid=isg1iz10244

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2007/dec/msg00002.html

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta07-352a.html

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=307179

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2008-0001.html

Trust: 1.7

url:https://issues.rpath.com/browse/rpl-1813

Trust: 1.7

url:http://www.debian.org/security/2007/dsa-1400

Trust: 1.7

url:http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdksa-2007:207

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=378131

Trust: 1.7

url:http://lists.vmware.com/pipermail/security-announce/2008/000002.html

Trust: 1.7

url:http://www.openpkg.com/security/advisories/openpkg-sa-2007.023.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-0966.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-1011.html

Trust: 1.7

url:http://securitytracker.com/id?1018899

Trust: 1.7

url:http://secunia.com/advisories/27479

Trust: 1.7

url:http://secunia.com/advisories/27515

Trust: 1.7

url:http://secunia.com/advisories/27531

Trust: 1.7

url:http://secunia.com/advisories/27548

Trust: 1.7

url:http://secunia.com/advisories/27570

Trust: 1.7

url:http://secunia.com/advisories/27613

Trust: 1.7

url:http://secunia.com/advisories/27756

Trust: 1.7

url:http://secunia.com/advisories/27936

Trust: 1.7

url:http://secunia.com/advisories/28167

Trust: 1.7

url:http://secunia.com/advisories/28368

Trust: 1.7

url:http://secunia.com/advisories/28387

Trust: 1.7

url:http://secunia.com/advisories/31208

Trust: 1.7

url:http://www.novell.com/linux/security/advisories/2007_24_sr.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-552-1

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1

Trust: 1.4

url:http://www.frsirt.com/english/advisories/2007/3724

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/38270

Trust: 1.4

url:http://www.securityfocus.com/archive/1/483563/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/483584/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/485936/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/486859/100/0/threaded

Trust: 1.1

url:ftp://aix.software.ibm.com/aix/efixes/security/readme

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10669

Trust: 1.1

url:http://secunia.com/advisories/28993

Trust: 1.1

url:http://secunia.com/advisories/29074

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/3724

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/4238

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/4255

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0064

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0641

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38270

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5116

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=120352263023774&w=2

Trust: 1.0

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5116

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2007-5116

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/486859/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/485936/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/483584/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/483563/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/4255

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/4238

Trust: 0.6

url:http://www.ipcop.org/

Trust: 0.3

url:http://www.perl.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=767139#products

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2008-359.htm

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0966.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-1011.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3108

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-5135

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4572

Trust: 0.2

url:http://download3.vmware.com/software/esx/esx-2.5.5-65742-upgrade.tar.gz

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002975.tgz

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002969.tgz

Trust: 0.2

url:http://kb.vmware.com/kb/1002969

Trust: 0.2

url:http://kb.vmware.com/kb/1002971

Trust: 0.2

url:http://www.vmware.com/resources/techresources/726

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002972.tgz

Trust: 0.2

url:http://kb.vmware.com/kb/1002964

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-5398

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5135

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002968.tgz

Trust: 0.2

url:http://www.vmware.com/security

Trust: 0.2

url:http://download3.vmware.com/software/esx/esx-2.5.4-65752-upgrade.tar.gz

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5191

Trust: 0.2

url:http://kb.vmware.com/kb/1002972

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002976.tgz

Trust: 0.2

url:http://www.vmware.com/download/vi/vi3_patches.html

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002970.tgz

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-4572

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002962.tgz

Trust: 0.2

url:http://kb.vmware.com/kb/1002968

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002971.tgz

Trust: 0.2

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.2

url:http://kb.vmware.com/kb/1002975

Trust: 0.2

url:http://www.vmware.com/support/esx25/doc/esx-255-200712-patch.html

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3108

Trust: 0.2

url:http://kb.vmware.com/kb/1002970

Trust: 0.2

url:http://www.vmware.com/support/esx25/doc/esx-254-200712-patch.html

Trust: 0.2

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.2

url:http://www.vmware.com/download/esx/esx2_patches.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-5360

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5360

Trust: 0.2

url:http://kb.vmware.com/kb/1003176

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5398

Trust: 0.2

url:http://kb.vmware.com/kb/1002962

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1003176.tgz

Trust: 0.2

url:http://download3.vmware.com/software/vi/esx-1002964.tgz

Trust: 0.2

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-5191

Trust: 0.2

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.2

url:http://kb.vmware.com/kb/1002976

Trust: 0.2

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=41

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=120352263023774&amp;w=2

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.8-7etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.8.4-8sarge6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.4-8sarge6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.8.8-7etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.4-8sarge6_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.4-8sarge6_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.8.8-7etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.8.8-7etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.8-7etch1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl5.8_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.8-7etch1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-base_5.8.4-8sarge3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.8-7etch1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.8.4-8sarge6_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl_5.8.4-8sarge6_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.8.4-8sarge6_hppa.deb

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2741

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5266

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2445

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1536

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3108

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-1536

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5266

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1205

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0338

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-11.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2877

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0339

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0720

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1664

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0160

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-200712405-sg.zip

Trust: 0.1

url:http://kb.vmware.com/kb/1003208

Trust: 0.1

url:http://kb.vmware.com/kb/1003205

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-200712402-sg

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-200712404-sg.zip

Trust: 0.1

url:http://kb.vmware.com/kb/1003206

Trust: 0.1

url:http://kb.vmware.com/kb/1003204

Trust: 0.1

url:http://www.vmware.com/download/vi/vi3_patches_35.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx350-200712403-sg.zip

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=perl_v51bb27-es-20080207

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001399-v51bb26-es-20071207

Trust: 0.1

sources: VULHUB: VHN-28478 // BID: 26350 // JVNDB: JVNDB-2007-000796 // PACKETSTORM: 60738 // PACKETSTORM: 129524 // PACKETSTORM: 62401 // PACKETSTORM: 60703 // PACKETSTORM: 62911 // PACKETSTORM: 63867 // CNNVD: CNNVD-200711-104 // NVD: CVE-2007-5116

CREDITS

Tavis Ormandy taviso@gentoo.org Will Drewry wad@google.com

Trust: 0.6

sources: CNNVD: CNNVD-200711-104

SOURCES

db:VULHUBid:VHN-28478
db:BIDid:26350
db:JVNDBid:JVNDB-2007-000796
db:PACKETSTORMid:60738
db:PACKETSTORMid:129524
db:PACKETSTORMid:62401
db:PACKETSTORMid:60703
db:PACKETSTORMid:62911
db:PACKETSTORMid:63867
db:CNNVDid:CNNVD-200711-104
db:NVDid:CVE-2007-5116

LAST UPDATE DATE

2024-11-11T21:18:33.284000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28478date:2018-10-15T00:00:00
db:BIDid:26350date:2015-03-19T08:05:00
db:JVNDBid:JVNDB-2007-000796date:2009-02-20T00:00:00
db:CNNVDid:CNNVD-200711-104date:2007-11-08T00:00:00
db:NVDid:CVE-2007-5116date:2018-10-15T21:40:25.663

SOURCES RELEASE DATE

db:VULHUBid:VHN-28478date:2007-11-07T00:00:00
db:BIDid:26350date:2007-11-05T00:00:00
db:JVNDBid:JVNDB-2007-000796date:2007-11-27T00:00:00
db:PACKETSTORMid:60738date:2007-11-07T04:20:16
db:PACKETSTORMid:129524date:2014-12-12T17:43:12
db:PACKETSTORMid:62401date:2008-01-08T16:57:06
db:PACKETSTORMid:60703date:2007-11-06T06:59:51
db:PACKETSTORMid:62911date:2008-01-24T04:04:26
db:PACKETSTORMid:63867date:2008-02-21T04:45:39
db:CNNVDid:CNNVD-200711-104date:2007-11-07T00:00:00
db:NVDid:CVE-2007-5116date:2007-11-07T23:46:00