Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 704994 - (CVE-2011-0761) CVE-2011-0761 perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or FILEHANDLE value
CVE-2011-0761 perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20110503,reported=2...
: Security
Depends On: 705003
Blocks: 734553
  Show dependency treegraph
 
Reported: 2011-05-16 06:07 EDT by Jan Lieskovsky
Modified: 2016-03-04 06:20 EST (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-07-25 08:02:32 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2011-05-16 06:07:37 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-0761 to
the following vulnerability:

Perl 5.10.x allows context-dependent attackers to cause a denial of
service (NULL pointer dereference and application crash) by leveraging
an ability to inject arguments into a (1) getpeername, (2) readdir,
(3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir
function call.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0761
[2] http://www.securityfocus.com/archive/1/archive/1/517916/100/0/threaded
[3] http://www.toucan-system.com/advisories/tssa-2011-03.txt
[4] http://www.securityfocus.com/bid/47766
[5] http://securitytracker.com/id?1025507
[6] http://xforce.iss.net/xforce/xfdb/67355
Comment 1 Jan Lieskovsky 2011-05-16 06:09:21 EDT
Public PoC from [3]:
====================

#!/usr/bin/perl
$a =
getsockname(9505,4590,"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAA",17792);
Comment 2 Jan Lieskovsky 2011-05-16 06:10:44 EDT
This issue did NOT affect the versions of the perl package, as shipped
with Red Hat Enterprise Linux 4 and 5.

This issue affects the version of the perl package, as shipped with
Red Hat Enterprise Linux 6.

--

This issue affects the version of the perl package, as shipped with
Fedora release of 13.

This issue did NOT affect the version of the perl package, as shipped
with Fedora release of 14.
Comment 3 Jan Lieskovsky 2011-05-16 06:58:08 EDT
Created perl tracking bugs for this issue

Affects: fedora-13 [bug 705003]
Comment 4 Jan Lieskovsky 2013-07-25 08:00:07 EDT
Statement:

Red Hat does not consider this problem to be a security issue. Input passed to these functions should be under the full control of the script author, therefore no trust boundary is crossed.
Comment 5 Jan Lieskovsky 2013-07-25 08:01:46 EDT
Upstream mailing list reaction:
  http://www.xray.mpe.mpg.de/mailing-lists/perl5-porters/2011-06/msg00027.html

regarding classification of this issue as a security flaw.

Note You need to log in before you can comment on or make changes to this bug.