First published: Mon May 02 2005(Updated: )
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Ubuntu Linux | =4.10 | |
Debian GNU/Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
redhat enterprise Linux desktop | =4.0 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0077 is considered a moderate severity vulnerability due to the potential for local users to overwrite arbitrary files.
To fix CVE-2005-0077, ensure that all instances of the DBI library are updated to the patched versions provided by your Linux distribution.
CVE-2005-0077 affects multiple systems including Red Hat Enterprise Linux 4.0, Ubuntu Linux 4.10, and Debian Linux 3.0.
No, CVE-2005-0077 requires local access to exploit the vulnerability.
A symlink attack in CVE-2005-0077 refers to exploiting the insecure handling of temporary PID files to overwrite arbitrary files.