Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51604
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2005:031 (perl)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to perl
announced via advisory MDKSA-2005:031.

Jeroen van Wolffelaar discovered that the rmtree() function in the perl
File::Path module would remove directories in an insecure manner which
could lead to the removal of arbitrary files and directories via a
symlink attack (CVE-2004-0452).

Trustix developers discovered several insecure uses of temporary files
in many modules which could allow a local attacker to overwrite files
via symlink attacks (CVE-2004-0976).

KF discovered two vulnerabilities involving setuid-enabled perl
scripts. By setting the PERLIO_DEBUG environment variable and calling
an arbitrary setuid-root perl script, an attacker could overwrite
arbitrary files with perl debug messages (CVE-2005-0155). As well,
calling a setuid-root perl script with a very long path would cause a
buffer overflow if PERLIO_DEBUG was set, which could be exploited to
execute arbitrary files with root privileges (CVE-2005-0156).

The provided packages have been patched to resolve these problems.

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:031
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156

Risk factor : Medium

CVSS Score:
4.6

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2004-0452
BugTraq ID: 12072
http://www.securityfocus.com/bid/12072
Bugtraq: 20050111 [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl) (Google Search)
http://marc.info/?l=bugtraq&m=110547693019788&w=2
Debian Security Information: DSA-620 (Google Search)
http://www.debian.org/security/2004/dsa-620
http://fedoranews.org/updates/FEDORA--.shtml
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938
http://www.redhat.com/support/errata/RHSA-2005-103.html
http://www.redhat.com/support/errata/RHSA-2005-105.html
http://secunia.com/advisories/12991
http://secunia.com/advisories/18517
http://secunia.com/advisories/55314
SGI Security Advisory: 20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
https://www.ubuntu.com/usn/usn-44-1/
XForce ISS Database: perl-filepathrmtree-insecure-permissions(18650)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18650
Common Vulnerability Exposure (CVE) ID: CVE-2004-0976
BugTraq ID: 11294
http://www.securityfocus.com/bid/11294
http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9752
http://www.redhat.com/support/errata/RHSA-2005-881.html
http://secunia.com/advisories/17661
http://secunia.com/advisories/18075
http://www.trustix.org/errata/2004/0050
XForce ISS Database: script-temporary-file-overwrite(17583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
Common Vulnerability Exposure (CVE) ID: CVE-2005-0155
BugTraq ID: 12426
http://www.securityfocus.com/bid/12426
Bugtraq: 20050202 [USN-72-1] Perl vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110737149402683&w=2
Conectiva Linux advisory: CLSA-2006:1056
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
http://marc.info/?l=full-disclosure&m=110779723332339&w=2
http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml
http://www.digitalmunition.com/DMA[2005-0131a].txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404
http://secunia.com/advisories/14120
http://secunia.com/advisories/21646
http://www.trustix.org/errata/2005/0003/
XForce ISS Database: perl-perliodebug-file-overwrite(19207)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19207
Common Vulnerability Exposure (CVE) ID: CVE-2005-0156
http://marc.info/?l=full-disclosure&m=110779721503111&w=2
http://www.digitalmunition.com/DMA[2005-0131b].txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803
XForce ISS Database: perl-perliodebug-bo(19208)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19208
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.