VYPR
High severity7.5NVD Advisory· Published Apr 8, 2016· Updated May 6, 2026

CVE-2016-2381

CVE-2016-2381

Description

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.

Affected products

19
  • cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:configuration_manager:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:oracle:configuration_manager:*:*:*:*:*:*:*:*range: <12.1.2.0.4
    • cpe:2.3:a:oracle:configuration_manager:12.1.2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*
    Range: <18.1.2.1.0
  • cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
    Range: <5.23.9
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.