Vulnerability Name:

CVE-2005-0155 (CCN-19207)

Assigned:2005-02-01
Published:2005-02-01
Updated:2018-08-13
Summary:The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2005-0155

Source: CONECTIVA
Type: UNKNOWN
CLSA-2006:1056

Source: FEDORA
Type: UNKNOWN
FLSA-2006:152845

Source: BUGTRAQ
Type: UNKNOWN
20050202 [USN-72-1] Perl vulnerabilities

Source: FULLDISC
Type: UNKNOWN
20050207 DMA[2005-0131a] - 'Setuid Perl PERLIO_DEBUG root owned file creation'

Source: CCN
Type: RHSA-2005-103
perl security update

Source: CCN
Type: RHSA-2005-105
perl security update

Source: CCN
Type: SA14120
Perl "PERLIO_DEBUG" Privilege Escalation Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
14120

Source: CCN
Type: SA21646
Avaya Products Perl "PERLIO_DEBUG" Privilege Escalation

Source: SECUNIA
Type: UNKNOWN
21646

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm

Source: CCN
Type: ASA-2006-163
perl security update (RHSA-2006-0605)

Source: CCN
Type: CIAC Information Bulletin P-122
Updated Perl Packages Fix Security Issues

Source: MISC
Type: Broken Link
http://www.digitalmunition.com/DMA[2005-0131a].txt

Source: CCN
Type: GLSA-200502-13
Perl: Vulnerabilities in perl-suid wrapper

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200502-13

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:031

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:103

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:105

Source: BID
Type: Exploit, Patch, Vendor Advisory
12426

Source: CCN
Type: BID-12426
Perl SuidPerl Multiple Local Vulnerabilities

Source: TRUSTIX
Type: Patch
2005-0003

Source: CCN
Type: USN-72-1
Perl vulnerabilities

Source: XF
Type: UNKNOWN
perl-perliodebug-file-overwrite(19207)

Source: XF
Type: UNKNOWN
perl-perliodebug-file-overwrite(19207)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10404

Source: SUSE
Type: SUSE-SR:2005:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20050155
    V
    CVE-2005-0155
    2015-11-16
    oval:org.mitre.oval:def:10404
    V
    Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
    2013-04-29
    oval:com.redhat.rhsa:def:20050103
    P
    RHSA-2005:103: perl security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050105
    P
    RHSA-2005:105: perl security update (Important)
    2005-02-07
    BACK
    larry_wall perl 5.8.0