FreeBSD : perl -- vulnerabilities in PERLIO_DEBUG handling (a5eb760a-753c-11d9-a36f-000a95bc6fae)

Medium Nessus Plugin ID 19062


The remote FreeBSD host is missing one or more security-related updates.


Kevin Finisterre discovered bugs in perl's I/O debug support :

- The environmental variable PERLIO_DEBUG is honored even by the set-user-ID perl command (usually named sperl or suidperl). As a result, a local attacker may be able to gain elevated privileges.

- A buffer overflow may occur in threaded versions of perl when the full pathname of the script being executed is very long.

Note: By default, no set-user-ID perl binary is installed. An administrator must enable it manually at build time with the ENABLE_SUIDPERL port flag.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 19062

File Name: freebsd_pkg_a5eb760a753c11d9a36f000a95bc6fae.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2005/07/13

Modified: 2016/08/17

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:perl, p-cpe:/a:freebsd:freebsd:perl-threaded, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/02/02

Vulnerability Publication Date: 2005/02/02

Reference Information

CVE: CVE-2005-0155, CVE-2005-0156