[Bug 658976] perl-CGI: CRLF injection vulnerability via a crafted URL

bugzilla at redhat.com bugzilla at redhat.com
Tue Dec 7 22:17:02 UTC 2010


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=658976

Vincent Danen <vdanen at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |vdanen at redhat.com

Bug 658976 depends on bug 657950, which changed state.

Bug 657950 Summary: perl-5.12.2/CGI-3.50 security update
https://bugzilla.redhat.com/show_bug.cgi?id=657950

           What    |Old Value                   |New Value
----------------------------------------------------------------------------
             Status|MODIFIED                    |ON_QA
             Status|ON_QA                       |CLOSED
         Resolution|                            |ERRATA

--- Comment #3 from Vincent Danen <vdanen at redhat.com> 2010-12-07 17:17:01 EST ---
This looks to have been assigned CVE-2010-2761:

Name: CVE-2010-2761
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761
Assigned: 20100714
Reference: MLIST:[oss-security] 20101201 CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/1
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/3
Reference: MLIST:[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids,
perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)
Reference: URL: http://openwall.com/lists/oss-security/2010/12/01/2
Reference: MISC: https://bugzilla.mozilla.org/show_bug.cgi?id=600464
Reference: CONFIRM: http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm
Reference: CONFIRM:
http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1
Reference: CONFIRM:
http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html
Reference: CONFIRM:
https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380

The multipart_init function in (1) CGI.pm before 3.50 and (2)
Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of
the MIME boundary string in multipart/x-mixed-replace content, which
allows remote attackers to inject arbitrary HTTP headers and conduct
HTTP response splitting attacks via crafted input that contains this
value, a different vulnerability than CVE-2010-3172.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.



More information about the perl-devel mailing list