develooper Front page | perl.perl5.porters | Postings from March 2013

[perl #117073] Vulnerability in XML::Simple

Thread Next
From:
advisories
Date:
March 7, 2013 17:55
Subject:
[perl #117073] Vulnerability in XML::Simple
Message ID:
rt-3.6.HEAD-28177-1362598439-870.117073-75-0@perl.org
# New Ticket Created by  "advisories" 
# Please include the string:  [perl #117073]
# in the subject line of all future correspondence about this issue. 
# <URL: https://rt.perl.org:443/rt3/Ticket/Display.html?id=117073 >


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,
 
We have a security advisory that affects the XML::Simple module
distributed on CPAN.  It is likely that other Perl XML modules are also
affected.  How would you like to proceed?  We normally like to take a
co-ordinated approach to the disclosure of new vulnerabilities.  You can
find details of our disclosure practices in the attached PDF.  We con
communicate by PGP if that suits other parties.
 
Tim

Tim Brown

Head Of Research

Senior Security Consultant

Portcullis Computer Security Ltd

The Grange Barn, Pike's End, Pinner, Middlesex, HA5 2EX 

http://www.portcullis-security.com/
<http://www.portcullis-security.com/> 

Tel: +44 (0)20 8868 0098

Fax: +44 (0)20 8868 0017

Email: advisories@portcullis-security.com
<mailto:advisories@portcullis-security.com> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iQEcBAEBAgAGBQJRN5n9AAoJECflJKyfX3/OlUkH/AlP+7Uo6fHy5wrAZm239BVN
cD/h5zZhCrlfdr3+yGBQ13gSRX4xaYB4Je2MPls7cbdthwrnkVYDHEgkueqcIydO
1oRhLomDomA72WzPECGyRXRovC37Rabm+aBSKcymj16V/bEwzrQl+QS08YyiQ3ZO
bPul0TJ5Cn6MxncxVDDNw1d49f5Y/hq27ZJWiulFf00K58MLUDW41bGrjQdz7CYL
YEQ+HJc0gHdBUAy7Xd0yTYI4GsxMSGuyq8f7ff9SX1OEJNqUL5enUuKd2IVIIKF+
AAPcfVXeUSmdjHP/s0t2UKRjedZ5ImTR1mHIfu/3BA2HccyxH2ieHgln1F9eXM0=
=VhQr
-----END PGP SIGNATURE-----


Thread Next


nntp.perl.org: Perl Programming lists via nntp and http.
Comments to Ask Bjørn Hansen at ask@perl.org | Group listing | About