FreeBSD : perl -- vulnerabilities in PERLIO_DEBUG handling (a5eb760a-753c-11d9-a36f-000a95bc6fae)

medium Nessus Plugin ID 19062

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Kevin Finisterre discovered bugs in perl's I/O debug support :

- The environmental variable PERLIO_DEBUG is honored even by the set-user-ID perl command (usually named sperl or suidperl). As a result, a local attacker may be able to gain elevated privileges.
(CVE-2005-0155)

- A buffer overflow may occur in threaded versions of perl when the full pathname of the script being executed is very long.
(CVE-2005-0156).

Note: By default, no set-user-ID perl binary is installed. An administrator must enable it manually at build time with the ENABLE_SUIDPERL port flag.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?b29a7930

Plugin Details

Severity: Medium

ID: 19062

File Name: freebsd_pkg_a5eb760a753c11d9a36f000a95bc6fae.nasl

Version: 1.17

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:perl, p-cpe:/a:freebsd:freebsd:perl-threaded, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/2/2005

Vulnerability Publication Date: 2/2/2005

Reference Information

CVE: CVE-2005-0155, CVE-2005-0156