First published: Fri Oct 13 2000(Updated: )
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.6 | |
Perl | =5.5 | |
Perl | =5.5.3 | |
Perl | =5.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.