RHEL 4 : perl (RHSA-2006:0605)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated Perl packages that fix security a security issue are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Kevin Finisterre discovered a flaw in sperl, the Perl setuid wrapper,
which can cause debugging information to be logged to arbitrary files.
By setting an environment variable, a local user could cause sperl to
create, as root, files with arbitrary filenames, or append the
debugging information to existing files. (CVE-2005-0155)

A fix for this issue was first included in the update RHSA-2005:103
released in February 2005. However the patch to correct this issue was
dropped from the update RHSA-2005:674 made in October 2005. This
regression has been assigned CVE-2006-3813.

Users of Perl are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2006-3813.html
http://rhn.redhat.com/errata/RHSA-2005-105.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155
http://rhn.redhat.com/errata/RHSA-2006-0605.html

Solution :

Update the affected perl and / or perl-suidperl packages.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 22223 ()

Bugtraq ID: 12426

CVE ID: CVE-2005-0155
CVE-2006-3813