Mandrake Linux Security Advisory : perl (MDKSA-2005:031)

medium Nessus Plugin ID 16360


The remote Mandrake Linux host is missing one or more security updates.


Jeroen van Wolffelaar discovered that the rmtree() function in the perl File::Path module would remove directories in an insecure manner which could lead to the removal of arbitrary files and directories via a symlink attack (CVE-2004-0452).

Trustix developers discovered several insecure uses of temporary files in many modules which could allow a local attacker to overwrite files via symlink attacks (CVE-2004-0976).

'KF' discovered two vulnerabilities involving setuid-enabled perl scripts. By setting the PERLIO_DEBUG environment variable and calling an arbitrary setuid-root perl script, an attacker could overwrite arbitrary files with perl debug messages (CVE-2005-0155). As well, calling a setuid-root perl script with a very long path would cause a buffer overflow if PERLIO_DEBUG was set, which could be exploited to execute arbitrary files with root privileges (CVE-2005-0156).

The provided packages have been patched to resolve these problems.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 16360

File Name: mandrake_MDKSA-2005-031.nasl

Version: 1.19

Type: local

Published: 2/10/2005

Updated: 1/6/2021

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: Medium

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:perl, p-cpe:/a:mandriva:linux:perl-base, p-cpe:/a:mandriva:linux:perl-devel, p-cpe:/a:mandriva:linux:perl-doc, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/8/2005

Reference Information

CVE: CVE-2004-0452, CVE-2004-0976, CVE-2005-0155, CVE-2005-0156

MDKSA: 2005:031