Summary
The remote host is missing an update to perl
announced via advisory DSA 1400-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201400-1
Insight
Will Drewry and Tavis Ormandy of the Google Security Team have discovered a UTF-8 related heap overflow in Perl's regular expression compiler, probably allowing attackers to execute arbitrary code by compiling specially crafted regular expressions.
For the stable distribution (etch), this problem has been fixed in version 5.8.8-7etch1.
For the old stable distribution (sarge), this problem has been fixed in version 5.8.4-8sarge6.
For the unstable distribution (sid), this problem will be fixed soon.
Some architectures are missing from this DSA
these updates will be
released once they are available.
We recommend that you upgrade your perl package.
Severity
Classification
-
CVE CVE-2007-5116 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities