CPANSA-CGI-2010-4411: CGI vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2010-12-06T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2010-12-06T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
Vulnerabilities
CVE-2010-4411
Vulnerability DescriptionUnspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
CGI less than 3.50 |
|
Fixed
- CGI greater than or equal 3.50
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-CGI-2010-4411 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2010/cpansa-cgi-2010-4411.json - http://openwall.com/lists/oss-security/2010/12/01/3 external
http://openwall.com/lists/oss-security/2010/12/01/3 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:008 external
http://www.mandriva.com/security/advisories?name=MDVSA-2011:008 - http://www.vupen.com/english/advisories/2011/0106 external
http://www.vupen.com/english/advisories/2011/0106 - http://www.bugzilla.org/security/3.2.9/ external
http://www.bugzilla.org/security/3.2.9/ - http://secunia.com/advisories/43033 external
http://secunia.com/advisories/43033 - https://bugzilla.mozilla.org/show_bug.cgi?id=591165 external
https://bugzilla.mozilla.org/show_bug.cgi?id=591165 - http://www.vupen.com/english/advisories/2011/0207 external
http://www.vupen.com/english/advisories/2011/0207 - http://www.vupen.com/english/advisories/2011/0271 external
http://www.vupen.com/english/advisories/2011/0271 - http://www.vupen.com/english/advisories/2011/0212 external
http://www.vupen.com/english/advisories/2011/0212 - http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html external
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html - http://secunia.com/advisories/43068 external
http://secunia.com/advisories/43068 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html external
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/43165 external
http://secunia.com/advisories/43165 - http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html external
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html - http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html external
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - CVE-2010-4411 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2010-4411
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Mon Dec 6 00:00:00 2010 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/