![]() |
with SecurityTracker! | |
Home | View Topics | Search | |
|
Category: Application (Generic) > Perl | Vendors: Wall, Larry |
Perl File::Path.pm rmtree() Race Condition May Let Local Users Create Privileged Binaries
| ||||||
SecurityTracker Alert ID: 1014211 | ||||||
SecurityTracker URL: https://securitytracker.com/id/1014211 | ||||||
CVE Reference: CVE-2005-0448 (Links to External Site) | ||||||
Updated: Dec 20 2005 | ||||||
Original Entry Date: Jun 16 2005
| ||||||
Impact:
Modification of system information, Root access via local system | ||||||
Fix Available: Yes Vendor Confirmed: Yes | ||||||
Version(s): prior to 5.8.4 | ||||||
Description:
In March 2005, a vulnerability was reported in the rmtree() function in File::Path.pm. A local user may be able to create set user id (setuid) binaries in certain cases. A local user can exploit a race condition to create setuid binaries in a directory tree while the directory tree is being deleted by a root level user. The user must have write permissions in that directory tree to exploit this flaw. Paul Szabo discovered this vulnerability. | ||||||
Impact:
A local user can create setuid binaries in certain cases. | ||||||
Solution:
The vendor has issued a fixed version (5.8.4 or later), available at: http://www.perl.com/CPAN/src/ Red Hat has issued a fix for Red Hat Enterprise Linux 4: https://rhn.redhat.com/errata/RHSA-2005-674.html | ||||||
Cause:
Access control error, State error | ||||||
Underlying OS: Linux (Any), UNIX (Any) | ||||||
| ||||||
Message History:
This archive entry has one or more follow-up message(s) listed below.
| ||||||
![]() | ||||||
| ||||||