Lucene search

K
freebsdFreeBSDA5EB760A-753C-11D9-A36F-000A95BC6FAE
HistoryFeb 02, 2005 - 12:00 a.m.

perl -- vulnerabilities in PERLIO_DEBUG handling

2005-02-0200:00:00
vuxml.freebsd.org
11

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

0.4%

Kevin Finisterre discovered bugs in perl’s I/O debug support:

The environmental variable PERLIO_DEBUG is honored even
by the set-user-ID perl command (usually
named sperl or suidperl). As a
result, a local attacker may be able to gain elevated
privileges. (CVE-2005-0155)
A buffer overflow may occur in threaded versions of perl
when the full pathname of the script being executed is
very long. (CVE-2005-0156).

Note: By default, no set-user-ID perl
binary is installed. An administrator must enable it
manually at build time with the ENABLE_SUIDPERL
port flag.

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

0.4%