Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-0155

11 documents9 sources
Severity
4.6MEDIUM
EPSS
0.4%
top 41.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 2
Latest updateMay 1

Description

The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages2 packages

Debianperl< 5.8.4-6+3
NVDlarry_wall/perl5.8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-wmj6-p2pm-q3w6: The PerlIO implementation in Perl 52022-05-01
OSV
CVE-2005-0155: The PerlIO implementation in Perl 52005-05-02
CVEList
CVE-2005-0155: The PerlIO implementation in Perl 52005-02-07

💥Exploits & PoCs

1
Exploit-DB
Setuid perl - 'PerlIO_Debug()' Root Owned File Creation Privilege Escalation2005-02-07

📋Vendor Advisories

3
Ubuntu
Perl vulnerabilities2005-02-02
Red Hat
security flaw2005-02-01
Debian
CVE-2005-0155: perl - The PerlIO implementation in Perl 5.8.0, when installed with setuid support (spe...2005

💬Community

2
Bugzilla
CVE-2006-3813 security flaw2018-08-16
Bugzilla
CVE-2005-0155 security flaw2018-08-16