FreeBSD : perl -- vulnerabilities in PERLIO_DEBUG handling (a5eb760a-753c-11d9-a36f-000a95bc6fae)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Kevin Finisterre discovered bugs in perl's I/O debug support :

- The environmental variable PERLIO_DEBUG is honored even by the
set-user-ID perl command (usually named sperl or suidperl). As a
result, a local attacker may be able to gain elevated privileges.
(CVE-2005-0155)

- A buffer overflow may occur in threaded versions of perl when the
full pathname of the script being executed is very long.
(CVE-2005-0156).

Note: By default, no set-user-ID perl binary is installed. An
administrator must enable it manually at build time with the
ENABLE_SUIDPERL port flag.

See also :

http://www.nessus.org/u?d43e4200

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19062 (freebsd_pkg_a5eb760a753c11d9a36f000a95bc6fae.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0155
CVE-2005-0156

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now