Rapid7 Vulnerability & Exploit Database

RHSA-2002:081: perl-Digest-MD5 UTF8 bug results in incorrect MD5 sums

Back to Search

RHSA-2002:081: perl-Digest-MD5 UTF8 bug results in incorrect MD5 sums

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
07/26/2002
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated perl-Digest-MD5 packages are available which work around a bug in the utf8 interaction between perl-Digest-MD5 and Perl.

A bug in utf8 interaction between perl-Digest-MD5 and Perl results in utf8 strings having improper MD5 digests. This update works around the problem and provides correct checksums for all input. To determine if a machine is vulnerable, run the following command at a shell prompt: perl -le 'use Digest::MD5 qw/md5_hex/; $s = "test\x{101}"; chop $s; print (md5_hex($s) eq md5_hex("test") ? "ok" : "not ok")' If the output is any message other than "ok" then an upgrade is recommended. All 7.3 systems are vulnerable; no earlier versions should have this issue.

Solution(s)

  • redhat-upgrade-perl-digest-md5

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;