Upstream information

CVE-2005-0156 at MITRE

Description

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having low severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 65354 [RESOLVED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX Retail Solution 8
SuSE Linux Desktop 1.0
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • perl >= 5.8.0-201
slox4,2.x86
suse91.x86
suse91.ppc
suse91.s390x
suse91.x86-64
ul1.ppc
ul1.s390x
ul1.x86-64
ul1.s390
suse91.ia64
ul1.ia64
suse91.s390
YOU Patch Nr: 9860
Novell Linux Desktop 9 for x86
  • perl >= 5.8.3-32.4
slox4,2.x86
suse91.x86
suse91.ppc
suse91.s390x
suse91.x86-64
ul1.ppc
ul1.s390x
ul1.x86-64
ul1.s390
suse91.ia64
ul1.ia64
suse91.s390
YOU Patch Nr: 9860