![]() |
with SecurityTracker! | |
Home | View Topics | Search | |
|
Category: Application (Generic) > Perl | Vendors: Wall, Larry |
Perl Includes Directory Bug Lets Local Users Gain Elevated Privileges
| ||
SecurityTracker Alert ID: 1036440 | ||
SecurityTracker URL: https://securitytracker.com/id/1036440 | ||
CVE Reference: CVE-2016-1238 (Links to External Site) | ||
Date: Jul 26 2016
| ||
Impact:
Execution of arbitrary code via local system, User access via local system | ||
Fix Available: Yes Vendor Confirmed: Yes | ||
| ||
Description:
A vulnerability was reported in Perl. A local user can obtain elevated privileges on the target system. The software may load code from the current working directory when loading optional modules due to the includes directory array ("@INC"). As a result, a local user may be able to cause the target Perl application to load and execute arbitrary code on the target system with elevated privileges. John Lightsey and Todd Rinaldo from cPanel Security reported this vulnerability. | ||
Impact:
A local user can obtain elevated privileges on the target system. | ||
Solution:
The vendor has issued a fix (5.22.3-RC2, 5.24.1-RC2). The vendor's advisories are available at: http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238269.html http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238270.html | ||
Vendor URL: www.perl.org/ (Links to External Site)
| ||
Cause:
Access control error | ||
Underlying OS: Linux (Any), UNIX (Any), Windows (Any) | ||
| ||
Message History:
This archive entry has one or more follow-up message(s) listed below.
| ||
![]() | ||
| ||