Configuration Affecting perl-Compress-Raw-Zlib package, versions <1:2.020-130.el6_4


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
1.72% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE6-PERLCOMPRESSRAWZLIB-2473055
  • published10 Apr 2022
  • disclosed21 Nov 2012

Introduced: 21 Nov 2012

CVE-2012-5526  (opens in a new tab)
CWE-16  (opens in a new tab)

How to fix?

Upgrade Oracle:6 perl-Compress-Raw-Zlib to version 1:2.020-130.el6_4 or higher.
This issue was patched in ELSA-2013-0685.

NVD Description

Note: Versions mentioned in the description apply only to the upstream perl-Compress-Raw-Zlib package and not the perl-Compress-Raw-Zlib package as distributed by Oracle. See How to fix? for Oracle:6 relevant fixed versions and status.

CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.

CVSS Base Scores

version 3.1