First published: Wed Aug 11 2021(Updated: )
Encode could allow a local authenticated attacker to gain elevated privileges on the system, caused by an untrusted search path flaw. By using a specially-crafted Encode::ConfigLocal library, an attacker could exploit this vulnerability to gain elevated privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
P5-encode Project P5-encode | >=3.05<3.12 | |
Perl Perl | <=5.34.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =33 | |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
debian/libencode-perl | 3.08-1+deb11u2 3.08-1+deb11u1 3.19-1 3.21-1 | |
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u1 5.36.0-7+deb12u1 5.38.2-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36770 is a vulnerability in Perl through 5.34.0 that allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library.
Local users can exploit CVE-2021-36770 by placing a specially crafted Encode::ConfigLocal library in the current working directory to preempts dynamic module loading.
Versions 3.00-1+deb10u1, 3.08-1+deb11u2, 3.08-1+deb11u1, 3.19-1 of libencode-perl and versions 5.28.1-6+deb10u1, 5.32.1-4+deb11u2, 5.32.1-4+deb11u1, 5.36.0-7, 5.36.0-9 of Perl are affected by CVE-2021-36770.
CVE-2021-36770 has a severity rating of 7.8 (high).
To mitigate CVE-2021-36770, it is recommended to update to the fixed versions of Perl (above 5.36.0-9) and libencode-perl (above 3.19-1).