SB2021081069 - Fedora 33 Modular update for perl-bootstrap



SB2021081069 - Fedora 33 Modular update for perl-bootstrap

Published: August 10, 2021

Security Bulletin ID SB2021081069
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Insecure library loading (CVE-ID: CVE-2021-36770)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic error in the Encode.pm script. A local user can place a malicious library into the current working directory and escalate privileges on the system.


2) Privilege Escalation (CVE-ID: CVE-2016-1238)

The vulnerability allows a local user to obtain elevated privileges on the target system.

The vulnerability exists due to improper input validation. By sending and tricking the victim to load a specially crafted code a malicious user can cause arbitrary code execution that allows them to gain root privileges.

Successful exploitation of this vulnerability will result in arbitrary code execution that allows a local attacker to get elevated privilegs on the vulnerable system.




3) Insecure search path in perl5-porters (CVE-ID: CVE-2016-1238)

The vulnerability allows a local user to potentially elevate privileges.

The vulnerability exists due to Perl 5 module loads modules from the includes directory array ("@INC") in which the last element is the current directory ("."). A local attacker can place specially crafted modules into world-writable directory and trick the victim to run arbitrary script from this directory.

Successful exploitation of this vulnerability may allow a local attacker to obtain elevated privileges on the system.


Remediation

Install update from vendor's website.