Debian update for perl



Published: 2016-07-25
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2016-1238
CVE-2016-6185
CWE-ID CWE-427
CWE-141
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Debian Linux
Operating systems & Components / Operating system

Vendor Debian

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Insecure search path in perl5-porters

EUVDB-ID: #VU273

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-1238

CWE-ID: CWE-427 - Uncontrolled Search Path Element

Exploit availability: No

Description

The vulnerability allows a local user to potentially elevate privileges.

The vulnerability exists due to Perl 5 module loads modules from the includes directory array ("@INC") in which the last element is the current directory ("."). A local attacker can place specially crafted modules into world-writable directory and trick the victim to run arbitrary script from this directory.

Successful exploitation of this vulnerability may allow a local attacker to obtain elevated privileges on the system.

Mitigation

Update the affected package to version: 5.20.2-3+deb8u6

Vulnerable software versions

Debian Linux: All versions

External links

http://www.openbsd.org/errata58.html
http://www.openbsd.org/errata59.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) XSLoader relative path error in Perl

EUVDB-ID: #VU114

Risk: High

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-6185

CWE-ID: CWE-141 - Improper Neutralization of Parameter/Argument Delimiters

Exploit availability: No

Description

The vulnerability allows a local user to obtain elevated privileges on the target system.

The vulnerability exists due to an access control error in Perl. A local user can load arbitrary code from the current working directory by supplying specially crafted data to the XSLoader component.

Successful exploitation of this vulnerability may result in execution of arbitrary code.

Mitigation

Update the affected package to version: 5.20.2-3+deb8u6

Vulnerable software versions

Debian Linux: All versions

External links

http://perl5.git.perl.org/perl.git/commit/08e3451d7b3b714ad63a27f1b9c2a23ee75d15ee


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###