Improper Input Validation Affecting perl package, versions <5.22.1-4
Threat Intelligence
EPSS
0.92% (84th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-PERL-532593
- published 13 Jan 2016
- disclosed 13 Jan 2016
Introduced: 13 Jan 2016
CVE-2015-8607 Open this link in a new tabHow to fix?
Upgrade Debian:11
perl
to version 5.22.1-4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
References
- https://security-tracker.debian.org/tracker/CVE-2015-8607
- http://www.debian.org/security/2016/dsa-3441
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175494.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176228.html
- https://security.gentoo.org/glsa/201701-75
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://cpansearch.perl.org/src/RJBS/PathTools-3.62/Changes
- https://rt.perl.org/Public/Bug/Display.html?id=126862
- https://www.oracle.com/security-alerts/cpujul2020.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/80504
- http://www.securitytracker.com/id/1034772
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8607
- http://www.ubuntu.com/usn/USN-2878-1
CVSS Scores
version 3.1