Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50452
Category:Ubuntu Local Security Checks
Title:Ubuntu 4.10 USN-16-1 (perl)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to perl
announced via advisory USN-16-1.

Recently, Trustix Secure Linux discovered some vulnerabilities in the
perl package. The utility 'instmodsh', the Perl package 'PPPort.pm',
and several test scripts (which are not shipped and only used during
build) created temporary files in an insecure way, which could allow a
symlink attack to create or overwrite arbitrary files with the
privileges of the user invoking the program, or building the perl
package, respectively.

The following packages are affected: perl

Solution:
The problem can be corrected by upgrading the affected package to
version 5.8.4-2ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

http://lists.ubuntu.com/archives/ubuntu-security-announce/2004-November/000018.html

Risk factor : Medium

CVSS Score:
2.1

Cross-Ref: BugTraq ID: 11294
Common Vulnerability Exposure (CVE) ID: CVE-2004-0976
http://www.securityfocus.com/bid/11294
Debian Security Information: DSA-620 (Google Search)
http://www.debian.org/security/2004/dsa-620
http://fedoranews.org/updates/FEDORA--.shtml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
http://marc.info/?l=bugtraq&m=110547693019788&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9752
http://www.redhat.com/support/errata/RHSA-2005-881.html
http://secunia.com/advisories/17661
http://secunia.com/advisories/18075
http://www.trustix.org/errata/2004/0050
XForce ISS Database: script-temporary-file-overwrite(17583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.