Vulnerability Details : CVE-2002-1323
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Exploit prediction scoring system (EPSS) score for CVE-2002-1323
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 48 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-1323
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
[email protected] |
References for CVE-2002-1323
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160
-
http://www.redhat.com/support/errata/RHSA-2003-257.html
- http://www.redhat.com/support/errata/RHSA-2003-256.html
-
http://www.debian.org/security/2002/dsa-208
Patch;Vendor Advisory
-
ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html
-
http://marc.info/?l=bugtraq&m=104033126305252&w=2
-
http://marc.info/?l=bugtraq&m=104040175522502&w=2
-
http://marc.info/?l=bugtraq&m=104005919814869&w=2
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt
-
http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744
-
http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5
Patch
-
http://www.securityfocus.com/bid/6111
Patch;Vendor Advisory
-
http://www.iss.net/security_center/static/10574.php
Vendor Advisory
-
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt
Products affected by CVE-2002-1323
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
- cpe:2.3:a:sun:linux:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
- cpe:2.3:o:sco:unixware:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:sco:open_unix:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:safe.pm:safe.pm:2.0_7:*:*:*:*:*:*:*
- cpe:2.3:a:safe.pm:safe.pm:2.0_6:*:*:*:*:*:*:*