Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2016-04-08 08:59
Updated : 2020-09-10 06:20
NVD link : CVE-2016-2381
Mitre link : CVE-2016-2381
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
perl
- perl
canonical
- ubuntu_linux
oracle
- configuration_manager
- communications_billing_and_revenue_management
- database_server
- enterprise_manager_base_platform
- timesten_in-memory_database
- solaris
debian
- debian_linux
opensuse
- opensuse