CPANSA-perl-2005-0156: perl vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2005-02-07T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2005-02-07T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Vulnerabilities
CVE-2005-0156
Vulnerability DescriptionBuffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
perl equal 5.8.0 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-perl-2005-0156 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2005/cpansa-perl-2005-0156.json - http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml external
http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml - http://www.redhat.com/support/errata/RHSA-2005-103.html external
http://www.redhat.com/support/errata/RHSA-2005-103.html - http://www.redhat.com/support/errata/RHSA-2005-105.html external
http://www.redhat.com/support/errata/RHSA-2005-105.html - http://www.trustix.org/errata/2005/0003/ external
http://www.trustix.org/errata/2005/0003/ - http://www.securityfocus.com/bid/12426 external
http://www.securityfocus.com/bid/12426 - http://secunia.com/advisories/14120 external
http://secunia.com/advisories/14120 - http://fedoranews.org/updates/FEDORA--.shtml external
http://fedoranews.org/updates/FEDORA--.shtml - http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 external
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 - http://www.mandriva.com/security/advisories?name=MDKSA-2005:031 external
http://www.mandriva.com/security/advisories?name=MDKSA-2005:031 - http://secunia.com/advisories/55314 external
http://secunia.com/advisories/55314 - http://marc.info/?l=bugtraq&m=110737149402683&w=2 external
http://marc.info/?l=bugtraq&m=110737149402683&w=2 - http://marc.info/?l=full-disclosure&m=110779721503111&w=2 external
http://marc.info/?l=full-disclosure&m=110779721503111&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/19208 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/19208 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803 external
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803 - http://www.digitalmunition.com/DMA[2005-0131b].txt external
http://www.digitalmunition.com/DMA[2005-0131b].txt - CVE-2005-0156 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2005-0156
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Mon Feb 7 00:00:00 2005 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/