First published: Mon Feb 07 2005(Updated: )
The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0155 has been classified as a high-severity vulnerability due to its potential to allow local users to create arbitrary files.
To fix CVE-2005-0155, you should upgrade to a version of Perl that is later than 5.8.0 and does not include the vulnerable setuid configuration.
Local users on systems running Perl 5.8.0 with setuid support enabled are affected by CVE-2005-0155.
Attackers can exploit CVE-2005-0155 to create arbitrary files, which can lead to further system compromise.
CVE-2005-0155 is a local vulnerability, as it requires access to the system to be exploited.