[Omaha.pm] Perl security flaw?
Daniel Linder
dan at linder.org
Wed Nov 30 14:59:23 PST 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Saw this on NetworkWorld...
http://www.networkworld.com/news/2005/113005-perl-flaw.html
It's too vaigue to help any, but it sounds like the classic use of
un-checked user input being executed directly by the interperter (Perl or
otherwise).
Anyone heard anything more?
Dan
- - - - -
"Wait for that wisest of all counselors, time." -- Pericles
"I do not fear computers, I fear the lack of them." -- Isaac
Asimov
GPG fingerprint:6FFD DB94 7B96 0FD8 EADF 2EE0 B2B0 CC47 4FDE 9B68
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDji7LsrDMR0/em2gRAgjSAKC1RFU6ndhXc5iZNq4YrcpA5r0ERwCggn/3
Q3mwX13lUtqkRMepSk1DT6M=
=ogxg
-----END PGP SIGNATURE-----
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pm.org/pipermail/omaha-pm/attachments/20051130/f941e330/attachment.html
More information about the Omaha-pm
mailing list