Computer Security
[EN] securityvulns.ru no-pyccku


Perl symbolic links race conditions
updated since 27.12.2004
Published:04.12.2008
Source:
SecurityVulns ID:4314
Type:local
Threat Level:
5/10
Description:File::Path::rmtree unsecurely changes file permissions, creating race condiotns for symbolic links manipulation.
Affected:PERL : perl 5.8
 PERL : Perl 5.9
CVE:CVE-2008-5303 (Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to allows local users to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5302 due to affected versions.)
 CVE-2008-5302 (Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions.)
 CVE-2005-0448 (Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.)
 CVE-2004-0452 (Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1678-1] New perl packages fix privilege escalation (04.12.2008)
 documentSECUNIA, [SA13643] Perl "File::Path::rmtree" Race Condition (27.12.2004)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod