Description: | Description:
The remote host is missing an update to perl announced via advisory MDKSA-2005:031.
Jeroen van Wolffelaar discovered that the rmtree() function in the perl File::Path module would remove directories in an insecure manner which could lead to the removal of arbitrary files and directories via a symlink attack (CVE-2004-0452).
Trustix developers discovered several insecure uses of temporary files in many modules which could allow a local attacker to overwrite files via symlink attacks (CVE-2004-0976).
KF discovered two vulnerabilities involving setuid-enabled perl scripts. By setting the PERLIO_DEBUG environment variable and calling an arbitrary setuid-root perl script, an attacker could overwrite arbitrary files with perl debug messages (CVE-2005-0155). As well, calling a setuid-root perl script with a very long path would cause a buffer overflow if PERLIO_DEBUG was set, which could be exploited to execute arbitrary files with root privileges (CVE-2005-0156).
The provided packages have been patched to resolve these problems.
Affected versions: 10.0, 10.1, 9.2, Corporate 3.0, Corporate Server 2.1
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:031 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156
Risk factor : Medium
CVSS Score: 4.6
|