2.1

CVE-2005-0156

Exploit

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Larry WallPerl Version5.8.0
Larry WallPerl Version5.8.1
Larry WallPerl Version5.8.3
Larry WallPerl Version5.8.4
Larry WallPerl Version5.8.4.1
Larry WallPerl Version5.8.4.2
Larry WallPerl Version5.8.4.2.3
Larry WallPerl Version5.8.4.3
Larry WallPerl Version5.8.4.4
Larry WallPerl Version5.8.4.5
SgiPropack Version3.0
IbmAix Version5.2
IbmAix Version5.3
RedhatEnterprise Linux Version3.0 Editionadvanced_server
RedhatEnterprise Linux Version3.0 Editionenterprise_server
RedhatEnterprise Linux Version3.0 Editionworkstation_server
RedhatFedora Core Versioncore_3.0
SuseSuse Linux Version8.0
SuseSuse Linux Version8.0 Editioni386
SuseSuse Linux Version8.1
SuseSuse Linux Version8.2
SuseSuse Linux Version9.0
SuseSuse Linux Version9.0 Editionx86_64
SuseSuse Linux Version9.1
SuseSuse Linux Version9.2
TrustixSecure Linux Version1.5
TrustixSecure Linux Version2.0
TrustixSecure Linux Version2.1
TrustixSecure Linux Version2.2
UbuntuUbuntu Linux Version4.1 Editionia64
UbuntuUbuntu Linux Version4.1 Editionppc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.39% 0.568
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:N/I:P/A:N