Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2016-04-08 15:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-2381
Mitre link : CVE-2016-2381
CVE.ORG link : CVE-2016-2381
JSON object : View
Products Affected
oracle
- database_server
- communications_billing_and_revenue_management
- timesten_in-memory_database
- configuration_manager
- enterprise_manager_base_platform
- solaris
debian
- debian_linux
perl
- perl
opensuse
- opensuse
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation