CVE-2011-0761 Affecting perl package, versions <5.12.0-1
Threat Intelligence
EPSS
1.68% (88th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-PERL-527540
- published 13 May 2011
- disclosed 13 May 2011
Introduced: 13 May 2011
CVE-2011-0761 Open this link in a new tabHow to fix?
Upgrade Debian:11
perl
to version 5.12.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.
References
- https://security-tracker.debian.org/tracker/CVE-2011-0761
- http://www.securityfocus.com/archive/1/517916/100/0/threaded
- http://www.toucan-system.com/advisories/tssa-2011-03.txt
- http://securitytracker.com/id?1025507
- http://www.securityfocus.com/bid/47766
- http://securityreason.com/securityalert/8248
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67355
CVSS Scores
version 3.1