Mandrake Linux Security Advisory : perl (MDKSA-2005:031)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mandrake Linux host is missing one or more security

Description :

Jeroen van Wolffelaar discovered that the rmtree() function in the
perl File::Path module would remove directories in an insecure manner
which could lead to the removal of arbitrary files and directories via
a symlink attack (CVE-2004-0452).

Trustix developers discovered several insecure uses of temporary files
in many modules which could allow a local attacker to overwrite files
via symlink attacks (CVE-2004-0976).

'KF' discovered two vulnerabilities involving setuid-enabled perl
scripts. By setting the PERLIO_DEBUG environment variable and calling
an arbitrary setuid-root perl script, an attacker could overwrite
arbitrary files with perl debug messages (CVE-2005-0155). As well,
calling a setuid-root perl script with a very long path would cause a
buffer overflow if PERLIO_DEBUG was set, which could be exploited to
execute arbitrary files with root privileges (CVE-2005-0156).

The provided packages have been patched to resolve these problems.

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 16360 (mandrake_MDKSA-2005-031.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0452

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now