Description
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0157 | Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. |
Ubuntu USN |
USN-72-1 | Perl vulnerabilities |
References
History
No history.
Subscriptions
Ibm
Subscribe
Aix
Subscribe
Larry Wall
Subscribe
Perl
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Fedora Core
Subscribe
Sgi
Subscribe
Propack
Subscribe
Suse
Subscribe
Suse Linux
Subscribe
Trustix
Subscribe
Secure Linux
Subscribe
Ubuntu
Subscribe
Ubuntu Linux
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:05:24.911Z
Reserved: 2005-01-27T00:00:00.000Z
Link: CVE-2005-0156
No data.
Status : Deferred
Published: 2005-02-07T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-0156
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN