FreeBSD : perl -- vulnerabilities in PERLIO_DEBUG handling (a5eb760a-753c-11d9-a36f-000a95bc6fae)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Kevin Finisterre discovered bugs in perl's I/O debug support :

- The environmental variable PERLIO_DEBUG is honored even by the
set-user-ID perl command (usually named sperl or suidperl). As a
result, a local attacker may be able to gain elevated privileges.

- A buffer overflow may occur in threaded versions of perl when the
full pathname of the script being executed is very long.

Note: By default, no set-user-ID perl binary is installed. An
administrator must enable it manually at build time with the

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19062 (freebsd_pkg_a5eb760a753c11d9a36f000a95bc6fae.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0155

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now