CVE-2010-1168 Details

CVE-2010-1168

Published: 2010-06-21
Last Modified: 2017-09-19
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.5/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 6.4/10
Confidentiality Impact Partial
Availability Impact Partial
Integrity Impact Partial
Vector String AV:N/AC:L/Au:N/C:P/I:P/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:rafael_garcia-suarez:safe:2.08:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.09:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rafael_garcia-suarez:safe:2.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* No - -
References

http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html
http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in
http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://secunia.com/advisories/40049
http://secunia.com/advisories/40052
http://secunia.com/advisories/42402
http://securitytracker.com/id?1024062
http://www.mandriva.com/security/advisories?name=MDVSA-2010:115
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
http://www.openwall.com/lists/oss-security/2010/05/20/5
http://www.redhat.com/support/errata/RHSA-2010-0457.html
http://www.redhat.com/support/errata/RHSA-2010-0458.html
http://www.vupen.com/english/advisories/2010/3075
https://bugzilla.redhat.com/show_bug.cgi?id=576508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807

CVE ID
CVE-2010-1168
Published
2010-06-21
Modified
2017-09-19
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-264

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.