CVE-2016-2381

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
perlperl
𝑥
< 5.23.9
debiandebian_linux
7.0
debiandebian_linux
8.0
oraclecommunications_billing_and_revenue_management
7.5
oracleconfiguration_manager
𝑥
< 12.1.2.0.4
oracleconfiguration_manager
12.1.2.0.6
oracledatabase_server
11.2.0.4
oracledatabase_server
12.1.0.2
oracledatabase_server
12.2.0.1
oracleenterprise_manager_base_platform
13.2.0.0.0
oracleenterprise_manager_base_platform
13.3.0.0.0
oracletimesten_in-memory_database
𝑥
< 18.1.2.1.0
oraclesolaris
11.3
opensuseopensuse
13.2
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
perl
bullseye
5.32.1-4+deb11u3
fixed
bullseye (security)
5.32.1-4+deb11u4
fixed
bookworm
5.36.0-7+deb12u1
fixed
sid
5.40.0-6
fixed
trixie
5.40.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
perl
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
Fixed 5.20.2-6ubuntu0.2
released
trusty
Fixed 5.18.2-2ubuntu1.1
released
precise
Fixed 5.14.2-6ubuntu2.5
released
References