CVE-2008-5302

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735

http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

http://secunia.com/advisories/32980

http://secunia.com/advisories/33314

http://secunia.com/advisories/40052

http://support.apple.com/kb/HT4077

http://wiki.rpath.com/Advisories:rPSA-2009-0011

http://www.debian.org/security/2008/dsa-1678

http://www.gossamer-threads.com/lists/perl/porters/233695#233695

http://www.mandriva.com/security/advisories?name=MDVSA-2010:116

http://www.openwall.com/lists/oss-security/2008/11/28/2

http://www.redhat.com/support/errata/RHSA-2010-0458.html

http://www.securityfocus.com/archive/1/500210/100/0/threaded

http://www.ubuntu.com/usn/usn-700-1

http://www.ubuntu.com/usn/usn-700-2

https://exchange.xforce.ibmcloud.com/vulnerabilities/47043

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11076

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6890

Details

Source: MITRE

Published: 2008-12-01

Updated: 2018-10-11

Type: CWE-362

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
89741VMware ESX Multiple Vulnerabilities (VMSA-2010-0013) (remote check)NessusVMware ESX Local Security Checks
high
71119GLSA-201311-17 : Perl: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
68048Oracle Linux 5 : perl (ELSA-2010-0458)NessusOracle Linux Local Security Checks
high
60801Scientific Linux Security Update : perl on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
49085VMSA-2010-0013 : VMware ESX third-party updates for Service ConsoleNessusVMware ESX Local Security Checks
high
46878Mandriva Linux Security Advisory : perl (MDVSA-2010:116)NessusMandriva Local Security Checks
high
46874CentOS 5 : perl (CESA-2010:0458)NessusCentOS Local Security Checks
high
46834RHEL 5 : perl (RHSA-2010:0458)NessusRed Hat Local Security Checks
high
45373Mac OS X Multiple Vulnerabilities (Security Update 2010-002)NessusMacOS X Local Security Checks
critical
40295openSUSE Security Update : perl (perl-482)NessusSuSE Local Security Checks
medium
40105openSUSE Security Update : perl (perl-482)NessusSuSE Local Security Checks
medium
37888Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : libarchive-tar-perl, perl vulnerabilities (USN-700-1)NessusUbuntu Local Security Checks
medium
37746Ubuntu 8.04 LTS : perl regression (USN-700-2)NessusUbuntu Local Security Checks
medium
35031Debian DSA-1678-1 : perl - design flawsNessusDebian Local Security Checks
medium