Vulnerability Name: CVE-2010-1447 (CCN-23855) Assigned: 2010-05-17 Published: 2010-05-17 Updated: 2017-09-19 Summary: The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C )6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2005-4268 Source: MITRE Type: CNACVE-2010-0624 Source: MITRE Type: CNACVE-2010-1168 Source: MITRE Type: CNACVE-2010-1321 Source: MITRE Type: CNACVE-2010-1447 Source: MITRE Type: CNACVE-2010-2063 Source: CONFIRM Type: UNKNOWNhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console Source: OSVDB Type: UNKNOWN64756 Source: CCN Type: RHSA-2007-0245Low: cpio security and bug fix update Source: CCN Type: RHSA-2010-0141Moderate: tar security update Source: CCN Type: RHSA-2010-0142Moderate: tar security update Source: CCN Type: RHSA-2010-0143Moderate: cpio security update Source: CCN Type: RHSA-2010-0144Moderate: cpio security update Source: CCN Type: RHSA-2010-0145Moderate: cpio security update Source: CCN Type: RHSA-2010-0423Important: krb5 security update Source: CCN Type: RHSA-2010-0457Moderate: perl security update Source: CCN Type: RHSA-2010-0458Moderate: perl security update Source: CCN Type: RHSA-2010-0488Critical: samba and samba3x security update Source: CCN Type: RHSA-2010-0770Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2010-0807Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0873Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0935Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2010-0987Critical: java-1.6.0-ibm security and bug fix update Source: CCN Type: RHSA-2011-0152Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2011-0880Low: Red Hat Network Satellite server IBM Java Runtime security update Source: CCN Type: SA18251Cpio Large File Size Handling Denial of Service Vulnerability Source: CCN Type: SA38869GNU Cpio "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA39762Kerberos GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA39845PostgreSQL Two Vulnerabilities Source: SECUNIA Type: Vendor Advisory39845 Source: SECUNIA Type: UNKNOWN40049 Source: SECUNIA Type: UNKNOWN40052 Source: CCN Type: SA40145Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA41196VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41262VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA42280VMware ESX / ESXi Server Update for Multiple Packages Source: CCN Type: SA42402Oracle Solaris Perl Safe Module Security Bypass Source: CCN Type: SA42974Oracle JRockit Multiple Vulnerabilities Source: CCN Type: SA43335Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA47305F5 Enterprise Manager Multiple Vulnerabilities Source: CONFIRM Type: UNKNOWNhttp://security-tracker.debian.org/tracker/CVE-2010-1447 Source: CCN Type: SECTRACK ID: 1023988PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges Source: CCN Type: SECTRACK ID: 1024062Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed Source: CCN Type: SECTRACK ID: 1024107Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2007-251cpio security and bug fix update (RHSA-2007-0245) Source: CCN Type: F5 Networks Web siteRelease Note: Enterprise Manager version 2.3.0 Source: DEBIAN Type: UNKNOWNDSA-2267 Source: DEBIAN Type: DSA-2052krb5 -- null pointer dereference Source: DEBIAN Type: DSA-2061samba -- memory corruption Source: DEBIAN Type: DSA-2267perl -- restriction bypass Source: CCN Type: GNU Project Web siteCpio Source: MANDRIVA Type: UNKNOWNMDVSA-2010:115 Source: MANDRIVA Type: UNKNOWNMDVSA-2010:116 Source: MLIST Type: UNKNOWN[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011Oracle Critical Patch Update Advisory - July 2011 Source: CCN Type: OSVDB ID: 22194cpio on 64-bit Large File Size Handling Overflow Source: CCN Type: OSVDB ID: 62950GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow Source: CCN Type: OSVDB ID: 64744MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS Source: CCN Type: OSVDB ID: 64756PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447) Source: CCN Type: OSVDB ID: 65518Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption Source: CONFIRM Type: UNKNOWNhttp://www.postgresql.org/about/news.1203 Source: REDHAT Type: UNKNOWNRHSA-2010:0457 Source: REDHAT Type: UNKNOWNRHSA-2010:0458 Source: CCN Type: BID-16057CPIO File Size Stack Buffer Overflow Vulnerability Source: CCN Type: BID-40235MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability Source: BID Type: UNKNOWN40305 Source: CCN Type: BID-40305Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40884Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability Source: SECTRACK Type: UNKNOWN1023988 Source: CCN Type: USN-234-1cpio vulnerability Source: VUPEN Type: Patch, Vendor AdvisoryADV-2010-1167 Source: CONFIRM Type: UNKNOWNhttps://bugs.launchpad.net/bugs/cve/2010-1447 Source: CCN Type: Red Hat Bugzilla Bug 172669CVE-2005-4268 cpio large filesize buffer overflow Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=588269 Source: XF Type: UNKNOWNcpio-file-size-bo(23855) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11530 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:7320 Source: SUSE Type: SUSE-SA:2010:025Samba security update Source: SUSE Type: SUSE-SA:2011:006IBM Java 6 security update Source: SUSE Type: SUSE-SA:2011:014IBM Java security update Source: SUSE Type: SUSE-SR:2006:010SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2010:011SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2010:013SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2010:015SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2010:016SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2010:019SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2011:008SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:* Configuration 2 :cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:* Configuration 3 :cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:* Configuration 4 :cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:* Configuration 5 :cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:* Configuration 6 :cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:* Configuration 7 :cpe:/a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2010-1447 (CCN-56803) Assigned: 2010-03-09 Published: 2010-03-09 Updated: 2010-03-09 Summary: The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C )6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2005-4268 Source: MITRE Type: CNACVE-2010-0624 Source: MITRE Type: CNACVE-2010-1168 Source: MITRE Type: CNACVE-2010-1321 Source: MITRE Type: CNACVE-2010-1447 Source: MITRE Type: CNACVE-2010-2063 Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console Source: CCN Type: RHSA-2007-0245Low: cpio security and bug fix update Source: CCN Type: RHSA-2010-0141Moderate: tar security update Source: CCN Type: RHSA-2010-0142Moderate: tar security update Source: CCN Type: RHSA-2010-0143Moderate: cpio security update Source: CCN Type: RHSA-2010-0144Moderate: cpio security update Source: CCN Type: RHSA-2010-0145Moderate: cpio security update Source: CCN Type: RHSA-2010-0423Important: krb5 security update Source: CCN Type: RHSA-2010-0457Moderate: perl security update Source: CCN Type: RHSA-2010-0458Moderate: perl security update Source: CCN Type: RHSA-2010-0488Critical: samba and samba3x security update Source: CCN Type: RHSA-2010-0770Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2010-0807Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0873Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0935Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2010-0987Critical: java-1.6.0-ibm security and bug fix update Source: CCN Type: RHSA-2011-0152Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2011-0880Low: Red Hat Network Satellite server IBM Java Runtime security update Source: CCN Type: SA18251Cpio Large File Size Handling Denial of Service Vulnerability Source: CCN Type: SA38836GNU Tar "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA38869GNU Cpio "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA39762Kerberos GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA39845PostgreSQL Two Vulnerabilities Source: CCN Type: SA40145Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA40511Sun Solaris GNU Tar and GNU Cpio Buffer Overflow Vulnerability Source: CCN Type: SA41196VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41262VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA42280VMware ESX / ESXi Server Update for Multiple Packages Source: CCN Type: SA42402Oracle Solaris Perl Safe Module Security Bypass Source: CCN Type: SA42974Oracle JRockit Multiple Vulnerabilities Source: CCN Type: SA43335Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA47305F5 Enterprise Manager Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1023988PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges Source: CCN Type: SECTRACK ID: 1024062Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed Source: CCN Type: SECTRACK ID: 1024107Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: CCN Type: F5 Networks Web siteRelease Note: Enterprise Manager version 2.3.0 Source: DEBIAN Type: DSA-2052krb5 -- null pointer dereference Source: DEBIAN Type: DSA-2061samba -- memory corruption Source: DEBIAN Type: DSA-2267perl -- restriction bypass Source: CCN Type: GNU cpio Web pageIntroduction to Cpio Source: CCN Type: GNU tar Web siteTar - GNU Project - Free Software Foundation (FSF) Source: CCN Type: IBM Security Bulletin T1025085 (Flex System Manager Node)IBM Flex System Manager (FSM) is affected by tar vulnerabilities (CVE-2010-0624 CVE-2016-6321) Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011Oracle Critical Patch Update Advisory - July 2011 Source: CCN Type: OSVDB ID: 22194cpio on 64-bit Large File Size Handling Overflow Source: CCN Type: OSVDB ID: 62950GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow Source: CCN Type: OSVDB ID: 64744MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS Source: CCN Type: OSVDB ID: 64756PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447) Source: CCN Type: OSVDB ID: 65518Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption Source: CCN Type: BID-16057CPIO File Size Stack Buffer Overflow Vulnerability Source: CCN Type: BID-38628GNU Tar and GNU Cpio Remote Buffer Overflow Vulnerability Source: CCN Type: BID-40235MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability Source: CCN Type: BID-40305Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40884Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability Source: XF Type: UNKNOWNtar-cpio-rmtread-bo(56803) Source: CCN Type: SUSE-SA:2010:025Samba security update Source: CCN Type: SUSE-SA:2011:006IBM Java 6 security update Source: CCN Type: SUSE-SA:2011:014IBM Java security update Source: CCN Type: SUSE-SR:2010:011SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:013SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:015SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:016SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:019SUSE Security Summary Report Source: CCN Type: SUSE-SR:2011:008SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:gnu:tar:1.22:*:*:*:*:*:*:* OR cpe:/a:gnu:cpio:2.10:*:*:*:*:*:*:* AND cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/a:quest:intrust_knowledge_pack_for_sun_solaris:10.2.5.1024:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/h:ibm:flex_system_manager_node:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2010-1447 (CCN-58737) Assigned: 2010-05-17 Published: 2010-05-17 Updated: 2010-05-17 Summary: The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. CVSS v3 Severity: 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C )6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P )4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2005-4268 Source: MITRE Type: CNACVE-2010-0624 Source: MITRE Type: CNACVE-2010-1168 Source: MITRE Type: CNACVE-2010-1321 Source: MITRE Type: CNACVE-2010-1447 Source: MITRE Type: CNACVE-2010-2063 Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console Source: CCN Type: oss-security Mailing List, 20 May 18:26CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request Source: CCN Type: RHSA-2007-0245Low: cpio security and bug fix update Source: CCN Type: RHSA-2010-0141Moderate: tar security update Source: CCN Type: RHSA-2010-0142Moderate: tar security update Source: CCN Type: RHSA-2010-0143Moderate: cpio security update Source: CCN Type: RHSA-2010-0144Moderate: cpio security update Source: CCN Type: RHSA-2010-0145Moderate: cpio security update Source: CCN Type: RHSA-2010-0423Important: krb5 security update Source: CCN Type: RHSA-2010-0457Moderate: perl security update Source: CCN Type: RHSA-2010-0458Moderate: perl security update Source: CCN Type: RHSA-2010-0488Critical: samba and samba3x security update Source: CCN Type: RHSA-2010-0770Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2010-0807Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0873Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0935Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2010-0987Critical: java-1.6.0-ibm security and bug fix update Source: CCN Type: RHSA-2011-0152Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2011-0880Low: Red Hat Network Satellite server IBM Java Runtime security update Source: CCN Type: SA18251Cpio Large File Size Handling Denial of Service Vulnerability Source: CCN Type: SA38869GNU Cpio "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA39762Kerberos GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA39845PostgreSQL Two Vulnerabilities Source: CCN Type: SA40145Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA41196VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41262VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA42280VMware ESX / ESXi Server Update for Multiple Packages Source: CCN Type: SA42402Oracle Solaris Perl Safe Module Security Bypass Source: CCN Type: SA42974Oracle JRockit Multiple Vulnerabilities Source: CCN Type: SA43309VMware Products Oracle (Sun) JRE Multiple Vulnerabilities Source: CCN Type: SA43335Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA47305F5 Enterprise Manager Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1023988PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges Source: CCN Type: SECTRACK ID: 1024062Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed Source: CCN Type: SECTRACK ID: 1024107Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: CCN Type: F5 Networks Web siteRelease Note: Enterprise Manager version 2.3.0 Source: DEBIAN Type: DSA-2052krb5 -- null pointer dereference Source: DEBIAN Type: DSA-2061samba -- memory corruption Source: DEBIAN Type: DSA-2267perl -- restriction bypass Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011Oracle Critical Patch Update Advisory - July 2011 Source: CCN Type: OSVDB ID: 22194cpio on 64-bit Large File Size Handling Overflow Source: CCN Type: OSVDB ID: 62950GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow Source: CCN Type: OSVDB ID: 64744MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS Source: CCN Type: OSVDB ID: 64756PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447) Source: CCN Type: OSVDB ID: 65518Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption Source: CCN Type: PostgreSQL Web SitePostgreSQL Security Information Source: CCN Type: BID-16057CPIO File Size Stack Buffer Overflow Vulnerability Source: CCN Type: BID-40235MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability Source: CCN Type: BID-40302Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40305Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40884Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 588269 CVE-2010-1447 perl: Safe restriction bypass when reference to subroutine in compartment is called from outside Source: XF Type: UNKNOWNpostgresql-plperl-code-execution(58737) Source: CCN Type: SUSE-SA:2010:025Samba security update Source: CCN Type: SUSE-SA:2011:006IBM Java 6 security update Source: CCN Type: SUSE-SA:2011:014IBM Java security update Source: CCN Type: SUSE-SR:2010:011SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:013SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:015SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:016SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:019SUSE Security Summary Report Source: CCN Type: SUSE-SR:2011:008SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:* OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:* OR cpe:/a:larry_wall:perl:5.9.2:*:*:*:*:*:*:* OR cpe:/a:larry_wall:perl:5.8.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:* OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:* OR cpe:/a:larry_wall:perl:5.8.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2010-1447 (CCN-58747) Assigned: 2010-05-17 Published: 2010-05-17 Updated: 2010-05-18 Summary: The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. CVSS v3 Severity: 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C )6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P )3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-4268 Source: MITRE Type: CNACVE-2010-0624 Source: MITRE Type: CNACVE-2010-1168 Source: MITRE Type: CNACVE-2010-1321 Source: MITRE Type: CNACVE-2010-1447 Source: MITRE Type: CNACVE-2010-2063 Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console Source: CCN Type: RHSA-2007-0245Low: cpio security and bug fix update Source: CCN Type: RHSA-2010-0141Moderate: tar security update Source: CCN Type: RHSA-2010-0142Moderate: tar security update Source: CCN Type: RHSA-2010-0143Moderate: cpio security update Source: CCN Type: RHSA-2010-0144Moderate: cpio security update Source: CCN Type: RHSA-2010-0145Moderate: cpio security update Source: CCN Type: RHSA-2010-0423Important: krb5 security update Source: CCN Type: RHSA-2010-0457Moderate: perl security update Source: CCN Type: RHSA-2010-0458Moderate: perl security update Source: CCN Type: RHSA-2010-0488Critical: samba and samba3x security update Source: CCN Type: RHSA-2010-0770Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2010-0807Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0873Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0935Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2010-0987Critical: java-1.6.0-ibm security and bug fix update Source: CCN Type: RHSA-2011-0152Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2011-0880Low: Red Hat Network Satellite server IBM Java Runtime security update Source: CCN Type: SA18251Cpio Large File Size Handling Denial of Service Vulnerability Source: CCN Type: SA38869GNU Cpio "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA39762Kerberos GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA39845PostgreSQL Two Vulnerabilities Source: CCN Type: SA39953Heimdal GSS-API and kdc NULL Pointer Dereferences Denial of Service Source: CCN Type: SA40145Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA40209Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA41196VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41262VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA42280VMware ESX / ESXi Server Update for Multiple Packages Source: CCN Type: SA42402Oracle Solaris Perl Safe Module Security Bypass Source: CCN Type: SA42974Oracle JRockit Multiple Vulnerabilities Source: CCN Type: SA43335Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA47305F5 Enterprise Manager Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1023988PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges Source: CCN Type: SECTRACK ID: 1024062Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed Source: CCN Type: SECTRACK ID: 1024107Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: CCN Type: F5 Networks Web siteRelease Note: Enterprise Manager version 2.3.0 Source: CCN Type: MITKRB5-SA-2010-005GSS-API library null pointer dereference Source: DEBIAN Type: DSA-2052krb5 -- null pointer dereference Source: DEBIAN Type: DSA-2061samba -- memory corruption Source: DEBIAN Type: DSA-2267perl -- restriction bypass Source: CCN Type: Heimdal Web site2010-05-27 - Tries to follow NULL pointers in KDC and GSS-API Kerberos acceptor (server) Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011Oracle Critical Patch Update Advisory - July 2011 Source: CCN Type: Oracle Critical Patch Update Advisory - October 2010Oracle Critical Patch Update Advisory - October 2010 Source: CCN Type: Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010 Source: CCN Type: OSVDB ID: 22194cpio on 64-bit Large File Size Handling Overflow Source: CCN Type: OSVDB ID: 62950GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow Source: CCN Type: OSVDB ID: 64744MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS Source: CCN Type: OSVDB ID: 64756PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447) Source: CCN Type: OSVDB ID: 65518Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption Source: CCN Type: BID-16057CPIO File Size Stack Buffer Overflow Vulnerability Source: CCN Type: BID-40235MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability Source: CCN Type: BID-40305Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40884Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability Source: CCN Type: USN-940-1Kerberos vulnerabilities Source: XF Type: UNKNOWNkerberos-apreq-dos(58747) Source: CCN Type: ASA-2010-160Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SUSE-SA:2010:025Samba security update Source: CCN Type: SUSE-SA:2011:006IBM Java 6 security update Source: CCN Type: SUSE-SA:2011:014IBM Java security update Source: CCN Type: SUSE-SR:2010:011SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:013SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:015SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:016SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:019SUSE Security Summary Report Source: CCN Type: SUSE-SR:2011:008SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:oracle:database_server:*:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:-:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.7:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.8:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos:5-1.8:alpha:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/a:avaya:communication_manager:5.0:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:8.04:*:lts:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/a:avaya:communication_manager:5.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2010-1447 (CCN-59481) Assigned: 2010-05-17 Published: 2010-05-17 Updated: 2010-06-16 Summary: The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C )6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2005-4268 Source: MITRE Type: CNACVE-2010-0624 Source: MITRE Type: CNACVE-2010-1168 Source: MITRE Type: CNACVE-2010-1321 Source: MITRE Type: CNACVE-2010-1447 Source: MITRE Type: CNACVE-2010-2063 Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console Source: CCN Type: RHSA-2007-0245Low: cpio security and bug fix update Source: CCN Type: RHSA-2010-0141Moderate: tar security update Source: CCN Type: RHSA-2010-0142Moderate: tar security update Source: CCN Type: RHSA-2010-0143Moderate: cpio security update Source: CCN Type: RHSA-2010-0144Moderate: cpio security update Source: CCN Type: RHSA-2010-0145Moderate: cpio security update Source: CCN Type: RHSA-2010-0423Important: krb5 security update Source: CCN Type: RHSA-2010-0457Moderate: perl security update Source: CCN Type: RHSA-2010-0458Moderate: perl security update Source: CCN Type: RHSA-2010-0488Critical: samba and samba3x security update Source: CCN Type: RHSA-2010-0770Critical: java-1.6.0-sun security update Source: CCN Type: RHSA-2010-0807Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0873Critical: java-1.5.0-ibm security update Source: CCN Type: RHSA-2010-0935Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2010-0987Critical: java-1.6.0-ibm security and bug fix update Source: CCN Type: RHSA-2011-0152Moderate: java-1.4.2-ibm security update Source: CCN Type: RHSA-2011-0880Low: Red Hat Network Satellite server IBM Java Runtime security update Source: CCN Type: SA18251Cpio Large File Size Handling Denial of Service Vulnerability Source: CCN Type: SA38869GNU Cpio "rmt" Buffer Overflow Vulnerability Source: CCN Type: SA39762Kerberos GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA39845PostgreSQL Two Vulnerabilities Source: CCN Type: SA40145Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA41196VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41262VMware ESX Server Multiple Vulnerabilities Source: CCN Type: SA41600Sun Solaris Samba SMB1 Packet Chaining Memory Corruption Vulnerability Source: CCN Type: SA41602Sun Solaris GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA42280VMware ESX / ESXi Server Update for Multiple Packages Source: CCN Type: SA42402Oracle Solaris Perl Safe Module Security Bypass Source: CCN Type: SA42974Oracle JRockit Multiple Vulnerabilities Source: CCN Type: SA43335Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability Source: CCN Type: SA43887Xerox WorkCentre Samba SMB1 Packet Chaining Vulnerability Source: CCN Type: SA47305F5 Enterprise Manager Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1023988PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges Source: CCN Type: SECTRACK ID: 1024062Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed Source: CCN Type: SECTRACK ID: 1024107Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: CCN Type: Apple Web siteAbout Security Update 2010-005 Source: CCN Type: F5 Networks Web siteRelease Note: Enterprise Manager version 2.3.0 Source: DEBIAN Type: DSA-2052krb5 -- null pointer dereference Source: DEBIAN Type: DSA-2061samba -- memory corruption Source: DEBIAN Type: DSA-2267perl -- restriction bypass Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011Oracle Critical Patch Update Advisory - July 2011 Source: CCN Type: OSVDB ID: 22194cpio on 64-bit Large File Size Handling Overflow Source: CCN Type: OSVDB ID: 62950GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow Source: CCN Type: OSVDB ID: 64744MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS Source: CCN Type: OSVDB ID: 64756PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447) Source: CCN Type: OSVDB ID: 65518Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption Source: CCN Type: Samba Web siteSamba 3.0.x to 3.3.12 are affected by a memory corruption vulnerability. Source: CCN Type: BID-16057CPIO File Size Stack Buffer Overflow Vulnerability Source: CCN Type: BID-40235MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability Source: CCN Type: BID-40305Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities Source: CCN Type: BID-40884Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability Source: CCN Type: XRX11-002Software Update to Address Buffer Overflow Source: XF Type: UNKNOWNsamba-smb1-code-execution(59481) Source: CCN Type: iDefense Labs Public Advisory: 06.16.10Samba 3.3.12 Memory Corruption Vulnerability Source: CCN Type: SUSE-SA:2010:025Samba security update Source: CCN Type: SUSE-SA:2011:006IBM Java 6 security update Source: CCN Type: SUSE-SA:2011:014IBM Java security update Source: CCN Type: SUSE-SR:2010:011SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:013SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:015SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:016SUSE Security Summary Report Source: CCN Type: SUSE-SR:2010:019SUSE Security Summary Report Source: CCN Type: SUSE-SR:2011:008SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.7:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.10:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.26a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.27a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.11:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.12:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.14:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.14a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.15:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.16:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.17:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.18:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.19:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.20:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.20a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.20b:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.21:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.22:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.23:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.23a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.23b:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.23c:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.23d:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.24:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.21a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.21b:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.21c:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.13:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.26:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25b:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25c:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.8:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.9:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:pre1:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:pre2:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:rc1:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:rc2:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.25:rc3:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.27:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.28a:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.29:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.3:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.31:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.32:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.33:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.5:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.6:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.30:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.1:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.12:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.5:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.34:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.28:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.10:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.9:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.8:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.7:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.6:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.4:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.3:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.1:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.15:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.14:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.13:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.11:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.10:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.9:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.8:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2.7:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.37:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.36:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.0.35:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.11:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3.12:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.1.0:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.2:*:*:*:*:*:*:* OR cpe:/a:samba:samba:3.3:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* OR cpe:/h:xerox:workcentre_5755:-:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:* OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:42420 P Security update for logrotate (Important) 2022-07-25 oval:org.opensuse.security:def:20101447 V CVE-2010-1447 2022-05-20 oval:org.opensuse.security:def:42211 P Security update for openssh (Important) 2022-03-10 oval:org.opensuse.security:def:32233 P Security update for the Linux Kernel (Important) 2021-12-06 oval:org.opensuse.security:def:26162 P Security update for pcre (Moderate) 2021-11-10 oval:org.opensuse.security:def:31697 P Security update for opensc (Important) 2021-10-29 oval:org.opensuse.security:def:26156 P Security update for open-lldp (Moderate) 2021-10-26 oval:org.opensuse.security:def:31283 P Security update for apache2 (Important) 2021-10-06 oval:org.opensuse.security:def:26139 P Security update for libvirt (Moderate) 2021-10-04 oval:org.opensuse.security:def:31272 P Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important) 2021-09-23 oval:org.opensuse.security:def:32194 P Security update for xen (Important) 2021-09-23 oval:org.opensuse.security:def:31271 P Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important) 2021-09-23 oval:org.opensuse.security:def:32185 P Security update for ghostscript (Critical) 2021-09-21 oval:org.opensuse.security:def:26130 P Security update for ghostscript (Critical) 2021-09-21 oval:org.opensuse.security:def:32976 P Security update for cpio (Important) 2021-08-14 oval:org.opensuse.security:def:26099 P Security update for libsndfile (Critical) 2021-08-05 oval:org.opensuse.security:def:26098 P Security update for webkit2gtk3 (Important) 2021-08-03 oval:org.opensuse.security:def:32145 P Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important) 2021-07-21 oval:org.opensuse.security:def:26086 P Security update for libsolv (Important) 2021-06-28 oval:org.opensuse.security:def:26072 P Security update for caribou (Important) 2021-06-10 oval:org.opensuse.security:def:31638 P Security update for caribou (Important) 2021-06-10 oval:org.opensuse.security:def:32937 P Security update for MozillaFirefox (Important) 2021-06-08 oval:org.opensuse.security:def:36265 P perl-32bit-5.10.0-64.72.1 on GA media (Moderate) 2021-06-08 oval:org.opensuse.security:def:42672 P perl-32bit-5.10.0-64.72.1 on GA media (Moderate) 2021-06-08 oval:org.opensuse.security:def:36537 P perl-base-32bit-5.10.0-64.72.1 on GA media (Moderate) 2021-06-08 oval:org.opensuse.security:def:32091 P Security update for python3 (Important) 2021-05-17 oval:org.opensuse.security:def:32089 P Security update for samba (Important) 2021-05-04 oval:org.opensuse.security:def:26033 P Security update for ImageMagick (Moderate) 2021-04-20 oval:org.opensuse.security:def:31743 P Security update for python (Moderate) 2021-03-16 oval:org.opensuse.security:def:31732 P Security update for krb5-appl (Important) 2021-02-19 oval:org.opensuse.security:def:31731 P Security update for java-1_7_1-ibm (Important) 2021-02-18 oval:org.opensuse.security:def:26192 P Security update for php72 (Important) 2021-02-17 oval:org.opensuse.security:def:32255 P Security update for the Linux Kernel (Important) 2021-02-12 oval:org.opensuse.security:def:31725 P Security update for openvswitch (Important) 2021-02-12 oval:org.opensuse.security:def:26087 P Security update for sudo (Important) 2021-01-26 oval:org.opensuse.security:def:31357 P Security update for MozillaFirefox (Important) 2021-01-12 oval:org.opensuse.security:def:32098 P Security update for dovecot22 (Important) 2021-01-04 oval:org.opensuse.security:def:25984 P Security update for cyrus-sasl (Important) 2020-12-28 oval:org.opensuse.security:def:31565 P Security update for openssl (Important) 2020-12-11 oval:org.opensuse.security:def:36013 P perl-32bit-5.10.0-64.67.52 on GA media (Moderate) 2020-12-03 oval:org.opensuse.security:def:35804 P perl-32bit-5.10.0-64.55.1 on GA media (Moderate) 2020-12-03 oval:org.opensuse.security:def:31480 P Security update for python (Moderate) 2020-12-01 oval:org.opensuse.security:def:32446 P Security update for xen (Important) 2020-12-01 oval:org.opensuse.security:def:32768 P perl-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:31479 P Security update for python (Moderate) 2020-12-01 oval:org.opensuse.security:def:32397 P Security update for unzip (Moderate) 2020-12-01 oval:org.opensuse.security:def:32729 P librpcsecgss on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:26018 P Security update for freerdp (Important) 2020-12-01 oval:org.opensuse.security:def:32341 P Security update for spice (Moderate) 2020-12-01 oval:org.opensuse.security:def:25890 P Security update for php5 (Moderate) 2020-12-01 oval:org.opensuse.security:def:32047 P Security update for kvm (Important) 2020-12-01 oval:org.opensuse.security:def:25826 P Security update for the Linux Kernel (Important) 2020-12-01 oval:org.opensuse.security:def:26804 P perl-HTML-Parser on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25815 P Security update for the Linux Kernel (Important) 2020-12-01 oval:org.opensuse.security:def:32041 P Security update for krb5 (Important) 2020-12-01 oval:org.opensuse.security:def:26765 P librsvg on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:27011 P perl-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25814 P Security update for flash-player (Important) 2020-12-01 oval:org.opensuse.security:def:31949 P Security update for grub2 (Important) 2020-12-01 oval:org.opensuse.security:def:26716 P gvim on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:26976 P libtspi1 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:31817 P Security update for atftp (Important) 2020-12-01 oval:org.opensuse.security:def:26663 P PolicyKit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:26338 P Security update for Chromium (Moderate) 2020-12-01 oval:org.opensuse.security:def:26512 P Security update for pdns-recursor (Moderate) 2020-12-01 oval:org.opensuse.security:def:26294 P Security update for bluez (Important) 2020-12-01 oval:org.opensuse.security:def:26428 P Security update for redis (Moderate) 2020-12-01 oval:org.opensuse.security:def:26371 P Security update for Chromium (Important) 2020-12-01 oval:org.opensuse.security:def:26290 P Security update for ImageMagick (Moderate) 2020-12-01 oval:org.opensuse.security:def:32299 P Security update for python (Moderate) 2020-12-01 oval:org.opensuse.security:def:25931 P Security update for libcares2 (Low) 2020-12-01 oval:org.opensuse.security:def:25780 P Security update for python (Moderate) 2020-12-01 oval:org.opensuse.security:def:32025 P Security update for kernel-source (Important) 2020-12-01 oval:org.opensuse.security:def:25696 P Security update for sudo (Important) 2020-12-01 oval:org.opensuse.security:def:31986 P Security update for java-1_7_1-ibm (Important) 2020-12-01 oval:org.opensuse.security:def:27263 P perl-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25639 P Security update for libqt5-qtimageformats (Moderate) 2020-12-01 oval:org.opensuse.security:def:31937 P Security update for glibc (Moderate) 2020-12-01 oval:org.opensuse.security:def:27228 P libxcrypt on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25558 P Security update for systemd (Moderate) 2020-12-01 oval:org.opensuse.security:def:31881 P Security update for dnsmasq (Important) 2020-12-01 oval:org.opensuse.security:def:26590 P libmusicbrainz4 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25430 P Security update for java-1_7_1-ibm (Important) 2020-12-01 oval:org.opensuse.security:def:26546 P findutils on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25366 P Security update for ghostscript (Important) 2020-12-01 oval:org.opensuse.security:def:26280 P Security update for ImageMagick (Moderate) 2020-12-01 oval:org.opensuse.security:def:33228 P perl-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25355 P Security update for xen (Important) 2020-12-01 oval:org.opensuse.security:def:31581 P Security update for tar (Moderate) 2020-12-01 oval:org.opensuse.security:def:26241 P Security update for evolution (Moderate) 2020-12-01 oval:org.opensuse.security:def:33189 P libupsclient1 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25354 P Security update for mozilla-nspr, mozilla-nss (Important) 2020-12-01 oval:org.opensuse.security:def:31489 P Security update for python (Moderate) 2020-12-01 oval:org.opensuse.security:def:32551 P libexiv2-4 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:32507 P evolution-data-server on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25988 P Security update for gd (Moderate) 2020-12-01 oval:org.opensuse.security:def:25904 P Security update for gegl (Moderate) 2020-12-01 oval:org.opensuse.security:def:27535 P perl-base-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25847 P Security update for flash-player (Important) 2020-12-01 oval:org.opensuse.security:def:27500 P libwebkit-1_0-2 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25766 P Security update for mariadb (Important) 2020-12-01 oval:org.opensuse.security:def:26862 P apache2 on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25638 P Security update for the Linux Kernel (Important) 2020-12-01 oval:org.opensuse.security:def:31933 P Security update for glibc (Moderate) 2020-12-01 oval:org.opensuse.security:def:26818 P rsyslog on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25574 P Security update for MozillaFirefox (Moderate) 2020-12-01 oval:org.opensuse.security:def:31846 P Security update for clamav (Important) 2020-12-01 oval:org.opensuse.security:def:26532 P cron on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25563 P Security update for xrdp (Important) 2020-12-01 oval:org.opensuse.security:def:31789 P Security update for MozillaFirefox (Moderate) 2020-12-01 oval:org.opensuse.security:def:26493 P Security update for phpMyAdmin (Important) 2020-12-01 oval:org.opensuse.security:def:26803 P perl-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:25562 P Security update for MozillaFirefox (Important) 2020-12-01 oval:org.opensuse.security:def:26444 P Security update for mumble (Moderate) 2020-12-01 oval:org.opensuse.security:def:26768 P libsnmp15-32bit on GA media (Moderate) 2020-12-01 oval:org.opensuse.security:def:26391 P Security update for MozillaThunderbird (Important) 2020-12-01 oval:org.opensuse.security:def:31491 P Security update for Python 2020-12-01 oval:org.opensuse.security:def:26240 P Security update for gd (Moderate) 2020-12-01 oval:org.opensuse.security:def:32485 P PolicyKit on GA media (Moderate) 2020-12-01 oval:org.mitre.oval:def:13932 P USN-1129-1 -- perl vulnerabilities 2014-06-30 oval:org.mitre.oval:def:13030 P DSA-2267-1 perl -- restriction bypass 2014-06-23 oval:org.mitre.oval:def:22753 P ELSA-2010:0458: perl security update (Moderate) 2014-05-26 oval:org.mitre.oval:def:22359 P RHSA-2010:0458: perl security update (Moderate) 2014-02-24 oval:org.mitre.oval:def:7320 V VMware ESX,Service Console update for perl. 2014-01-20 oval:org.mitre.oval:def:11530 V The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. 2013-04-29 oval:com.redhat.rhsa:def:20100457 P RHSA-2010:0457: perl security update (Moderate) 2010-06-07 oval:com.redhat.rhsa:def:20100458 P RHSA-2010:0458: perl security update (Moderate) 2010-06-07
BACK
postgresql postgresql 7.4
postgresql postgresql 7.4.1
postgresql postgresql 7.4.2
postgresql postgresql 7.4.3
postgresql postgresql 7.4.4
postgresql postgresql 7.4.5
postgresql postgresql 7.4.6
postgresql postgresql 7.4.7
postgresql postgresql 7.4.8
postgresql postgresql 7.4.9
postgresql postgresql 7.4.10
postgresql postgresql 7.4.11
postgresql postgresql 7.4.12
postgresql postgresql 7.4.13
postgresql postgresql 7.4.14
postgresql postgresql 7.4.15
postgresql postgresql 7.4.16
postgresql postgresql 7.4.17
postgresql postgresql 7.4.18
postgresql postgresql 7.4.19
postgresql postgresql 7.4.20
postgresql postgresql 7.4.21
postgresql postgresql 7.4.22
postgresql postgresql 7.4.23
postgresql postgresql 7.4.24
postgresql postgresql 7.4.25
postgresql postgresql 7.4.26
postgresql postgresql 7.4.27
postgresql postgresql 7.4.28
postgresql postgresql 8.0
postgresql postgresql 8.0.0
postgresql postgresql 8.0.1
postgresql postgresql 8.0.2
postgresql postgresql 8.0.3
postgresql postgresql 8.0.4
postgresql postgresql 8.0.5
postgresql postgresql 8.0.6
postgresql postgresql 8.0.7
postgresql postgresql 8.0.8
postgresql postgresql 8.0.9
postgresql postgresql 8.0.10
postgresql postgresql 8.0.11
postgresql postgresql 8.0.12
postgresql postgresql 8.0.13
postgresql postgresql 8.0.14
postgresql postgresql 8.0.15
postgresql postgresql 8.0.16
postgresql postgresql 8.0.17
postgresql postgresql 8.0.18
postgresql postgresql 8.0.19
postgresql postgresql 8.0.20
postgresql postgresql 8.0.21
postgresql postgresql 8.0.22
postgresql postgresql 8.0.23
postgresql postgresql 8.0.24
postgresql postgresql 8.1
postgresql postgresql 8.1.0
postgresql postgresql 8.1.1
postgresql postgresql 8.1.2
postgresql postgresql 8.1.3
postgresql postgresql 8.1.4
postgresql postgresql 8.1.5
postgresql postgresql 8.1.6
postgresql postgresql 8.1.7
postgresql postgresql 8.1.8
postgresql postgresql 8.1.9
postgresql postgresql 8.1.10
postgresql postgresql 8.1.11
postgresql postgresql 8.1.12
postgresql postgresql 8.1.13
postgresql postgresql 8.1.14
postgresql postgresql 8.1.15
postgresql postgresql 8.1.16
postgresql postgresql 8.1.17
postgresql postgresql 8.1.18
postgresql postgresql 8.1.19
postgresql postgresql 8.1.20
postgresql postgresql 8.2
postgresql postgresql 8.2.1
postgresql postgresql 8.2.2
postgresql postgresql 8.2.3
postgresql postgresql 8.2.4
postgresql postgresql 8.2.5
postgresql postgresql 8.2.6
postgresql postgresql 8.2.7
postgresql postgresql 8.2.8
postgresql postgresql 8.2.9
postgresql postgresql 8.2.10
postgresql postgresql 8.2.11
postgresql postgresql 8.2.12
postgresql postgresql 8.2.13
postgresql postgresql 8.2.14
postgresql postgresql 8.2.15
postgresql postgresql 8.2.16
postgresql postgresql 8.3
postgresql postgresql 8.3.1
postgresql postgresql 8.3.2
postgresql postgresql 8.3.3
postgresql postgresql 8.3.4
postgresql postgresql 8.3.5
postgresql postgresql 8.3.6
postgresql postgresql 8.3.7
postgresql postgresql 8.3.8
postgresql postgresql 8.3.9
postgresql postgresql 8.3.10
postgresql postgresql 8.4
postgresql postgresql 8.4.1
postgresql postgresql 8.4.2
postgresql postgresql 8.4.3
postgresql postgresql 9.0.0 beta1
gnu tar 1.22
gnu cpio 2.10
sun solaris 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
quest intrust knowledge pack for sun solaris 10.2.5.1024
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
ibm flex system manager node *
larry_wall perl 5.8.0
larry_wall perl 5.8.3
larry_wall perl 5.9.2
larry_wall perl 5.8.6
postgresql postgresql 8.0
postgresql postgresql 8.1
postgresql postgresql 8.2
postgresql postgresql 7.4
larry_wall perl 5.8.1
larry_wall perl 5.8.8
postgresql postgresql 8.3
postgresql postgresql 8.4
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
oracle database server *
mit kerberos 5-1.1
mit kerberos 5-1.3
mit kerberos 5-1.5
mit kerberos 5-1.2.2
mit kerberos 5-1.6.3
mit kerberos 5
mit kerberos 5-1.2
mit kerberos 5-1.2.1
mit kerberos 5-1.2.3
mit kerberos 5-1.2.4
mit kerberos 5-1.2.5
mit kerberos 5-1.2.6
mit kerberos 5-1.2.7
mit kerberos 5-1.2.8
mit kerberos 5-1.3.1
mit kerberos 5-1.3.2
mit kerberos 5-1.3.3
mit kerberos 5-1.3.4
mit kerberos 5-1.3.5
mit kerberos 5-1.3.6
mit kerberos 5-1.4
mit kerberos 5-1.4.1
mit kerberos 5-1.4.2
mit kerberos 5-1.4.3
mit kerberos 5-1.4.4
mit kerberos 5-1.5.1
mit kerberos 5-1.5.2
mit kerberos 5-1.5.3
mit kerberos 5-1.6
mit kerberos 5-1.6.1
mit kerberos 5-1.6.2
mit kerberos 5-1.3 alpha1
mit kerberos 5_1.0
mit kerberos 5_1.0.6
mit kerberos 5_1.1
mit kerberos 5_1.1.1
mit kerberos 5_1.2 beta1
mit kerberos 5_1.2 beta2
mit kerberos 5_1.3.3
mit kerberos 5-1.7
mit kerberos 5-1.7.1
mit kerberos 5-1.8
mit kerberos 5-1.8.1
mit kerberos 5-1.8 alpha
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
canonical ubuntu 6.06
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
avaya communication manager 5.0
novell open enterprise server *
canonical ubuntu 8.04
novell opensuse 11.0
avaya communication manager 5.1
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.6
samba samba 3.0.4
samba samba 3.0.7
samba samba 3.0.10
samba samba 3.0.26a
samba samba 3.0.27a
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.0
samba samba 3.0.5
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.13
samba samba 3.0.26
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.25 pre1
samba samba 3.0.25 pre2
samba samba 3.0.25 rc1
samba samba 3.0.25 rc2
samba samba 3.0.25 rc3
samba samba 3.0.27
samba samba 3.0.4 rc1
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.2.0
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.0.30
samba samba 3.2.1
samba samba 3.2.12
samba samba 3.3.5
samba samba 3.0.34
samba samba 3.0.28
samba samba 3.3.0
samba samba 3.3.10
samba samba 3.3.9
samba samba 3.3.8
samba samba 3.3.7
samba samba 3.3.6
samba samba 3.3.4
samba samba 3.3.3
samba samba 3.3.2
samba samba 3.3.1
samba samba 3.2.15
samba samba 3.2.14
samba samba 3.2.13
samba samba 3.2.11
samba samba 3.2.10
samba samba 3.2.9
samba samba 3.2.8
samba samba 3.2.7
samba samba 3.0.37
samba samba 3.0.36
samba samba 3.0.35
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.1.0
samba samba 3.2
samba samba 3.3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
apple mac os x 10.5.8
apple mac os x server 10.5.8
vmware esx server 4.0
apple mac os x server 10.6.4
apple mac os x 10.6.4
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
xerox workcentre 5755 -
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0