[Bug 658976] perl-CGI: CRLF injection vulnerability via a crafted URL
bugzilla at redhat.com
bugzilla at redhat.com
Tue Dec 7 22:17:02 UTC 2010
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
https://bugzilla.redhat.com/show_bug.cgi?id=658976
Vincent Danen <vdanen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vdanen at redhat.com
Bug 658976 depends on bug 657950, which changed state.
Bug 657950 Summary: perl-5.12.2/CGI-3.50 security update
https://bugzilla.redhat.com/show_bug.cgi?id=657950
What |Old Value |New Value
----------------------------------------------------------------------------
Status|MODIFIED |ON_QA
Status|ON_QA |CLOSED
Resolution| |ERRATA
--- Comment #3 from Vincent Danen <vdanen at redhat.com> 2010-12-07 17:17:01 EST ---
This looks to have been assigned CVE-2010-2761:
Name: CVE-2010-2761
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761
Assigned: 20100714
Reference: MLIST:[oss-security] 20101201 CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/1
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/3
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/2
Reference: MISC: https://bugzilla.mozilla.org/show_bug.cgi?id=600464
Reference: CONFIRM: http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1
Reference: CONFIRM:
http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html
Reference: CONFIRM:
https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380
The multipart_init function in (1) CGI.pm before 3.50 and (2)
Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of
the MIME boundary string in multipart/x-mixed-replace content, which
allows remote attackers to inject arbitrary HTTP headers and conduct
HTTP response splitting attacks via crafted input that contains this
value, a different vulnerability than CVE-2010-3172.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
More information about the perl-devel
mailing list