[Omaha.pm] Perl security flaw?

Daniel Linder dan at linder.org
Wed Nov 30 14:59:23 PST 2005



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Saw this on NetworkWorld...



http://www.networkworld.com/news/2005/113005-perl-flaw.html



It's too vaigue to help any, but it sounds like the classic use of
un-checked user input being executed directly by the interperter (Perl or
otherwise).  



Anyone heard anything more?



Dan



- - - - -

"Wait for that wisest of all counselors, time." -- Pericles

"I do not fear computers, I fear the lack of them." -- Isaac
Asimov

GPG fingerprint:6FFD DB94 7B96 0FD8 EADF  2EE0 B2B0 CC47 4FDE 9B68

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDji7LsrDMR0/em2gRAgjSAKC1RFU6ndhXc5iZNq4YrcpA5r0ERwCggn/3
Q3mwX13lUtqkRMepSk1DT6M=
=ogxg
-----END PGP SIGNATURE-----
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pm.org/pipermail/omaha-pm/attachments/20051130/f941e330/attachment.html


More information about the Omaha-pm mailing list