Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6185

Опубликовано: 02 авг. 2016
Источник: debian

Описание

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
perlfixed5.22.2-2package

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

CVSS3: 7.3
redhat
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

CVSS3: 7.8
nvd
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

CVSS3: 7.8
github
больше 3 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

suse-cvrf
больше 9 лет назад

Security update for perl