Summary
The host is installed with Active Perl and is prone to multiple code injection vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code on the system.
Impact Level: System/Application
Solution
Upgrade to Active Perl version 5.17.7 or later,
For updates refer to http://www.perl.org/get.html
Insight
An improper validation of input by the '_compile()' function which can be exploited to inject and execute arbitrary Perl code on the system.
Affected
Active Perl version prior to 5.17.7 on Windows
References
Severity
Classification
-
CVE CVE-2012-6329 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities