SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
(Red Hat Issues Fix) Perl DBI::ProxyServer Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1013212
SecurityTracker URL:  https://securitytracker.com/id/1013212
CVE Reference:   CVE-2005-0077   (Links to External Site)
Date:  Feb 16 2005
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Perl DBI library in the use of temporary files. A local user may be able to gain elevated privileges.

The 'DBI::ProxyServer' module in the Perl DBI library uses a process ID (PID) file in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to the PID file used by the library. Then, when a target user invokes an application that uses the module (such as 'dbiproxy'), the symlinked file may be created or overwritten with the privileges of the target user.

The flaws reside in 'dbiproxy.PL' and 'lib/DBI/ProxyServer.pm'.

Javier Fernandez-Sanguino Pena from the Debian Security Audit Project is credited with discovering this flaw.

Impact:   A local user may be able to gain elevated privileges.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

ppc:
a9a28fb845faf483e66253830c095cc9 perl-DBI-1.40-8.ppc.rpm

s390:
1574b5f38084c6a0bde8a7c8c83ccb0c perl-DBI-1.40-8.s390.rpm

s390x:
04b4f82b9627867ce69f796512fa0fb8 perl-DBI-1.40-8.s390x.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-DBI-1.40-8.src.rpm
3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm

Cause:   Access control error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Jan 26 2005 Perl DBI::ProxyServer Unsafe Temporary Files May Let Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2005:072-01] Low: perl-DBI security update


[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.