Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57248
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0605
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0605.

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Kevin Finisterre discovered a flaw in sperl, the Perl setuid wrapper, which
can cause debugging information to be logged to arbitrary files. By setting
an environment variable, a local user could cause sperl to create, as root,
files with arbitrary filenames, or append the debugging information to
existing files. (CVE-2005-0155)

A fix for this issue was first included in the update RHSA-2005:103
released in February 2005. However the patch to correct this issue was
dropped from the update RHSA-2005:674 made in October 2005. This
regression has been assigned CVE-2006-3813.

Users of Perl are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0605.html
http://rhn.redhat.com/errata/RHSA-2005-105.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Medium

CVSS Score:
4.6

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-3813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9456
RedHat Security Advisories: RHSA-2006:0605
http://rhn.redhat.com/errata/RHSA-2006-0605.html
http://secunia.com/advisories/21646
Common Vulnerability Exposure (CVE) ID: CVE-2005-0155
BugTraq ID: 12426
http://www.securityfocus.com/bid/12426
Bugtraq: 20050202 [USN-72-1] Perl vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110737149402683&w=2
Conectiva Linux advisory: CLSA-2006:1056
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
http://fedoranews.org/updates/FEDORA--.shtml
http://marc.info/?l=full-disclosure&m=110779723332339&w=2
http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
http://www.digitalmunition.com/DMA[2005-0131a].txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404
http://www.redhat.com/support/errata/RHSA-2005-103.html
http://www.redhat.com/support/errata/RHSA-2005-105.html
http://secunia.com/advisories/14120
http://www.trustix.org/errata/2005/0003/
XForce ISS Database: perl-perliodebug-file-overwrite(19207)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19207
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.