漏洞信息详情
Perlbot Text变量远程命令执行漏洞
- CNNVD编号:CNNVD-200212-138
- 危害等级: 高危
- CVE编号:
CVE-2002-1843
- 漏洞类型:
输入验证
- 发布时间:
2002-12-31
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
perlbot - 漏洞来源:
Discovery credited… -
漏洞简介
Perlbot 1.9.2版本存在漏洞。远程攻击者借助(1)SpelCheck.pm的$text变量或者(2) HTMLPlog.pm的$filename变量的shell元字符执行任意命令。
漏洞公告
The vendor will reportedly fix this vulnerability in a newer release of Perlbot.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com
参考网址
来源: BID
名称: 6009
链接:http://www.securityfocus.com/bid/6009
来源: BID
名称: 6008
链接:http://www.securityfocus.com/bid/6008
来源: XF
名称: perlbot-filename-command-execution(10404)
链接:http://www.iss.net/security_center/static/10404.php
来源: XF
名称: perlbot-text-command-execution(10403)
链接:http://www.iss.net/security_center/static/10403.php