CVE编号
CVE-2016-2381利用情况
暂无补丁情况
官方补丁披露时间
2016-04-09漏洞描述
Perl是美国程序员拉里-沃尔(Larry Wall)所研发的一种免费且功能强大的跨平台编程语言。由于程序未能正确处理环境变量,Perl中存在安全漏洞。攻击者可利用该漏洞绕过安全机制。
解决建议
用户可参考如下供应商提供的安全公告获得补丁信息:http://www.debian.org/security/2016/dsa-3501
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html | |
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d26... | |
http://www.debian.org/security/2016/dsa-3501 | |
http://www.gossamer-threads.com/lists/perl/porters/326387 | |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | |
http://www.securityfocus.com/bid/83802 | |
http://www.ubuntu.com/usn/USN-2916-1 | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://security.gentoo.org/glsa/201701-75 | |
https://www.oracle.com/security-alerts/cpuapr2020.html | |
https://www.oracle.com/security-alerts/cpujul2020.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | oracle | communications_billing_and_revenue_management | 7.5 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | configuration_manager | * |
Up to (excluding) 12.1.2.0.4 |
|||||
运行在以下环境 | |||||||||
应用 | oracle | configuration_manager | 12.1.2.0.6 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | database_server | 11.2.0.4 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | database_server | 12.1.0.2 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | database_server | 12.2.0.1 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | database_server | 18c | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | database_server | 19c | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | enterprise_manager_base_platform | 13.2.0.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | enterprise_manager_base_platform | 13.3.0.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | timesten_in-memory_database | * |
Up to (excluding) 18.1.2.1.0 |
|||||
运行在以下环境 | |||||||||
应用 | perl | perl | * |
Up to (excluding) 5.23.9 |
|||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 15.10 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 5.22.1-8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_7 | perl | * |
Up to (excluding) 5.14.2-21+deb7u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | perl | * |
Up to (excluding) 5.20.2-3+deb8u4 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_22 | perl | * |
Up to (excluding) 5.20.3-329.fc22 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_23 | perl | * |
Up to (excluding) 5.22.1-351.fc23 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse | opensuse | 13.2 | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_13.2 | perl | * |
Up to (excluding) 5.20.1-3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.1 | perl | * |
Up to (excluding) 5.18.2-5.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle | solaris | 11.3 | - | |||||
运行在以下环境 | |||||||||
系统 | sles_11_SP4 | perl | * |
Up to (excluding) 5.10.0-64.80.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | sles12-docker-image | * |
Up to (excluding) 1.1.4-20171002 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP1 | perl | * |
Up to (excluding) 5.18.2-11.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | perl | * |
Up to (excluding) 5.10.0-64.80.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP1 | perl | * |
Up to (excluding) 5.18.2-11.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | perl | * |
Up to (excluding) 5.14.2-6ubuntu2.5 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | perl | * |
Up to (excluding) 5.18.2-2ubuntu1.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | perl | * |
Up to (excluding) 5.18.2-2ubuntu1.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | perl | * |
Up to (excluding) 5.22.1-8 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...