Vulnerability Details : CVE-2002-1323
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Products affected by CVE-2002-1323
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
- cpe:2.3:a:sun:linux:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
- cpe:2.3:o:sco:unixware:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:sco:open_unix:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:safe.pm:safe.pm:2.0_7:*:*:*:*:*:*:*
- cpe:2.3:a:safe.pm:safe.pm:2.0_6:*:*:*:*:*:*:*
Threat overview for CVE-2002-1323
Top countries where our scanners detected CVE-2002-1323
Top open port discovered on systems with this issue
554
IPs affected by CVE-2002-1323 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-1323!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-1323
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1323
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2002-1323
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160
404 Not Found
-
http://www.redhat.com/support/errata/RHSA-2003-257.html
Support
-
http://www.redhat.com/support/errata/RHSA-2003-256.html
Support
-
http://www.debian.org/security/2002/dsa-208
Debian -- The Universal Operating SystemPatch;Vendor Advisory
-
ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html
-
http://marc.info/?l=bugtraq&m=104033126305252&w=2
'TSLSA-2002-0087 - perl' - MARC
-
http://marc.info/?l=bugtraq&m=104040175522502&w=2
'GLSA: perl' - MARC
-
http://marc.info/?l=bugtraq&m=104005919814869&w=2
'[OpenPKG-SA-2002.014] OpenPKG Security Advisory (perl)' - MARC
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt
-
http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744
Security-Hole in module Safe.pm · Issue #5975 · Perl/perl5 · GitHub
-
http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5
Patch
-
http://www.securityfocus.com/bid/6111
Patch;Vendor Advisory
-
http://www.iss.net/security_center/static/10574.php
Vendor Advisory
-
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt
Jump to