|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-103: perl Vulnerability Assessment Details
|
RHSA-2005-103: perl |
||
Check for the version of the perl packages Detailed Explanation for this Vulnerability Assessment Updated Perl packages that fix several security issues are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team Perl is a high-level programming language commonly used for system administration utilities and Web programming. Kevin Finisterre discovered a stack based buffer overflow flaw in sperl, the Perl setuid wrapper. A local user could create a sperl executable script with a carefully created path name, overflowing the buffer and leading to root privilege escalation. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0156 to this issue. Kevin Finisterre discovered a flaw in sperl which can cause debugging information to be logged to arbitrary files. By setting an environment variable, a local user could cause sperl to create, as root, files with arbitrary filenames, or append the debugging information to existing files. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0155 to this issue. An unsafe file permission bug was discovered in the rmtree() function in the File::Path module. The rmtree() function removes files and directories in an insecure manner, which could permit a local user to read or delete arbitrary files. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0452 to this issue. Users of Perl are advised to upgrade to this updated package, which contains backported patches to correct these issues. Solution : http://rhn.redhat.com/errata/RHSA-2005-103.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
Samsung FITplus USB 3.1 Flash Drive: Ultra-Fast 64GB & 128GB Mini Memory Sticks
$24.56
32GB 256-bit Encrypted USB Drive Password Secure Flash Drive USB3.0 U Disk D9B0
$33.52
NEW San Disk Cruzer Freedom USB Flash Drive 256MB (Windows 2000/XP only)
$30.00
SanDisk 128GB Ultra Shift USB 3.2 Gen 1 Flash Drive, Evening Primrose - SDCZ4...
$22.49
Sandisk 16GB 32GB 64GB 128GB Cruzer Blade Flash Drive Memory Stick USB Lot Pack
$4.99
64GB USB 3.0 Flash Drive USB Memory Stick High Speed Retractable USB Thumb Drive
$5.99
Type C USB 3.0 Flash Drive Thumb Drive Memory Stick for PC Laptop 512GB 1TB 2TB
$10.30
2TB USB 3.0 Flash Drive Thumb U Disk Memory Stick Pen PC Laptop Storage New
$10.79
LOT 32GB 64GB 128GB USB 3.0 Flash Drive Memory Stick Retractable Thumb Drive
$420.99
USB 3.0 Flash Drive 32GB 64GB 128GB Memory Stick Thumb Stick Lot Pack
$353.99
|
||
No Discussions have been posted on this vulnerability. |