| ID |
CVE-2004-0452
|
| Summary |
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. |
| References |
|
| Vulnerable Configurations |
|
| CVSS |
| Base: | 2.6 (as of 11-10-2017 - 01:29) |
| Impact: | |
| Exploitability: | |
|
| CWE |
NVD-CWE-Other |
| CAPEC |
|
| Access |
| Vector | Complexity | Authentication |
| LOCAL |
HIGH |
NONE |
|
| Impact |
| Confidentiality | Integrity | Availability |
| NONE |
PARTIAL |
PARTIAL |
|
| cvss-vector
via4
|
AV:L/AC:H/Au:N/C:N/I:P/A:P
|
| oval
via4
|
| accepted | 2013-04-29T04:23:28.128-04:00 | | class | vulnerability | | contributors | | name | Aharon Chernin | | organization | SCAP.com, LLC |
| name | Dragos Prisaca | | organization | G2, Inc. |
| | definition_extensions | | comment | The operating system installed on the system is Red Hat Enterprise Linux 3 | | oval | oval:org.mitre.oval:def:11782 |
| comment | CentOS Linux 3.x | | oval | oval:org.mitre.oval:def:16651 |
| comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | | oval | oval:org.mitre.oval:def:11831 |
| comment | CentOS Linux 4.x | | oval | oval:org.mitre.oval:def:16636 |
| comment | Oracle Linux 4.x | | oval | oval:org.mitre.oval:def:15990 |
| | description | Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. | | family | unix | | id | oval:org.mitre.oval:def:9938 | | status | accepted | | submitted | 2010-07-09T03:56:16-04:00 | | title | Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. | | version | 29 |
|
| redhat
via4
|
| advisories | | | rpms | - perl-3:5.8.5-12.1
- perl-debuginfo-3:5.8.5-12.1
- perl-suidperl-3:5.8.5-12.1.1
- perl-2:5.8.0-89.10
- perl-CGI-2:2.81-89.10
- perl-CPAN-2:1.61-89.10
- perl-DB_File-2:1.804-89.10
- perl-debuginfo-2:5.8.0-89.10
- perl-suidperl-2:5.8.0-89.10
|
|
| refmap
via4
|
| bid | 12072 | | bugtraq | 20050111 [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl) | | debian | DSA-620 | | fedora | FLSA-2006:152845 | | gentoo | GLSA-200501-38 | | secunia | | | sgi | 20060101-01-U | | ubuntu | USN-44-1 | | xf | perl-filepathrmtree-insecure-permissions(18650) |
|
| Last major update |
11-10-2017 - 01:29 |
| Published |
21-12-2004 - 05:00 |
| Last modified |
11-10-2017 - 01:29 |