Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2024.0127
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2024-0127)
Summary:The remote host is missing an update for the 'perl-HTTP-Body' package(s) announced via the MGASA-2024-0127 advisory.
Description:Summary:
The remote host is missing an update for the 'perl-HTTP-Body' package(s) announced via the MGASA-2024-0127 advisory.

Vulnerability Insight:
HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module
for Perl uses the part of the uploaded file's name after the first '.'
character as the suffix of a temporary file, which makes it easier for
remote attackers to conduct attacks by leveraging subsequent behavior
that may assume the suffix is well-formed. (CVE-2013-4407)

Affected Software/OS:
'perl-HTTP-Body' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4407
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721634
http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=13ac5b23c083bc56e32dd706ca02fca292bd2161
http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=cc75c886256f187cda388641931e8dafad6c2346
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00018.html
http://www.debian.org/security/2013/dsa-2801
https://metacpan.org/release/GETTY/HTTP-Body-1.23/
https://www.openwall.com/lists/oss-security/2024/04/07/1
http://www.openwall.com/lists/oss-security/2024/04/07/1
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.