First published: Fri Dec 16 2005(Updated: )
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.8.0 | |
Perl | =5.4 | |
Perl | =5.5 | |
Perl | =5.8.4.2 | |
Perl | <=5.8.6 | |
Perl | =5.8.4 | |
Perl | =5.6.1 | |
Perl | =5.8.4.5 | |
Perl | =5.8.4.3 | |
Perl | =5.5.3 | |
Perl | =5.3 | |
Perl | =5.8.4.2.3 | |
Perl | =5.8.1 | |
Perl | =5.4.5 | |
Perl | =5.8.4.1 | |
Perl | =5.8.4.4 | |
Perl | =5.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4278 is classified as a local privilege escalation vulnerability.
To fix CVE-2005-4278, update Perl to a version that is not affected, specifically 5.8.7-r1 or later.
CVE-2005-4278 affects local users in the portage group on Gentoo Linux who use vulnerable versions of Perl.
CVE-2005-4278 is caused by an untrusted search path vulnerability in Perl that allows the execution of malicious shared objects.
Yes, CVE-2005-4278 is specifically an issue in Gentoo Linux.