![]() There are no downloadable installers for 5.32 yet, so you can’t run them again to use the remove option from the installer. The whole Setup Wizard section is boiler-plate from older versions that doesn’t apply to 5.32 or 5.34 right now. COM>, Gurusamy Sarathy <>, Nick Ing-Simmons. ActiveState-Support September 21, 2021, 3:10am 7.See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_solution = \"Upgrade to Strawberry Perl 5.14.2 or later,\n Upgrade to Strawberry Perl PAR module version 1.003 or later\n Upgrade to Strawberry Perl Digest module version 1.17 or later\n Upgrade to Strawberry Perl Encode module version 2.44 or later\n Upgrade Strawberry Perl PAR::Packer module version 1.012 or later\n For updates refer to \n\n *****\n NOTE: Ignore this warning if above mentioned versions of modules are already installed.\n *****\" \n\ntag_impact = \"Successful exploitation will allow attackers to cause an affected\n application to crash or execute arbitrary perl code.\n Impact Level: System/Application\" \ntag_affected = \"Strawberry Perl PAR module before 1.003\n Strawberry Perl Digest module before 1.17\n Strawberry Perl Encode module before 2.44\n Strawberry Perl PAR::Packer module before 1.012 on winows\" \ntag_insight = \"The flaws are due to\n - an error in par_mktmpdir function in the 'PAR::Packer' and 'PAR' modules\n creates temporary files in a directory with a predictable name without\n verifying ownership and permissions of this directory.\n - the 'Digest->new()' function not properly sanitising input before using it\n in an 'eval()' call, which can be exploited to inject and execute arbitrary\n perl code.\n - off-by-one error in the decode_xs function in Unicode/Unicode.xs in the\n 'Encode' module.\n - An error within the 'File::Glob::bsd_glob()' function when handling the\n GLOB_ALTDIRFUNC flag can be exploited to cause an access violation and\n potentially execute arbitrary code.\" \ntag_summary = \"The host is installed with Strawberry Perl and is prone to\n multiple vulnerabilities. PL, perl Build, perl Build test, perl Build install RELEASE CONSIDERATIONS Version. , "pluginID": "802562", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $Id: gb_perl_modules_mult_vuln_win.nasl 5950 09:02:06Z teissa $\n#\n# Strawberry Perl Modules Multiple Vulnerabilities (Windows)\n#\n# Authors:\n# Madhuri D \n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, \n#\n# This program is free software you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |