Vulnerability Name:

CVE-2005-0156 (CCN-19208)

Assigned:2005-02-01
Published:2005-02-01
Updated:2018-08-13
Summary:Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-0156

Source: CONECTIVA
Type: UNKNOWN
CLSA-2006:1056

Source: FEDORA
Type: UNKNOWN
FLSA-2006:152845

Source: BUGTRAQ
Type: UNKNOWN
20050202 [USN-72-1] Perl vulnerabilities

Source: FULLDISC
Type: UNKNOWN
20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG

Source: CCN
Type: RHSA-2005-103
perl security update

Source: CCN
Type: RHSA-2005-105
perl security update

Source: CCN
Type: SA14120
Perl "PERLIO_DEBUG" Privilege Escalation Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
14120

Source: CCN
Type: SA55314
Oracle Solaris Perl Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
55314

Source: CCN
Type: CIAC Information Bulletin P-122
Updated Perl Packages Fix Security Issues

Source: MISC
Type: Broken Link
http://www.digitalmunition.com/DMA[2005-0131b].txt

Source: CCN
Type: GLSA-200502-13
Perl: Vulnerabilities in perl-suid wrapper

Source: GENTOO
Type: Exploit, Vendor Advisory
GLSA-200502-13

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:031

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:103

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:105

Source: BID
Type: Patch, Vendor Advisory
12426

Source: CCN
Type: BID-12426
Perl SuidPerl Multiple Local Vulnerabilities

Source: TRUSTIX
Type: Patch, Vendor Advisory
2005-0003

Source: CCN
Type: USN-72-1
Perl vulnerabilities

Source: XF
Type: UNKNOWN
perl-perliodebug-bo(19208)

Source: XF
Type: UNKNOWN
perl-perliodebug-bo(19208)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10803

Vulnerable Configuration:Configuration 1:
  • cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:sgi:propack:3.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20050156
    V
    CVE-2005-0156
    2015-11-16
    oval:org.mitre.oval:def:10803
    V
    Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
    2013-04-29
    oval:com.redhat.rhsa:def:20050103
    P
    RHSA-2005:103: perl security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20050105
    P
    RHSA-2005:105: perl security update (Important)
    2005-02-07
    BACK
    larry_wall perl 5.8.0
    larry_wall perl 5.8.1
    larry_wall perl 5.8.3
    larry_wall perl 5.8.4
    larry_wall perl 5.8.4.1
    larry_wall perl 5.8.4.2
    larry_wall perl 5.8.4.2.3
    larry_wall perl 5.8.4.3
    larry_wall perl 5.8.4.4
    larry_wall perl 5.8.4.5
    sgi propack 3.0
    ibm aix 5.2
    ibm aix 5.3
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux desktop 3.0
    redhat fedora core core_3.0
    suse suse linux 8.0
    suse suse linux 8.0
    suse suse linux 8.1
    suse suse linux 8.2
    suse suse linux 9.0
    suse suse linux 9.0
    suse suse linux 9.1
    suse suse linux 9.2
    trustix secure linux 1.5
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1