Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6185

Опубликовано: 30 июн. 2016
Источник: redhat
CVSS3: 7.3
CVSS2: 6.8
EPSS Низкий

Описание

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5perlWill not fix
Red Hat Enterprise Linux 6perlWill not fix
Red Hat Enterprise Linux 7perlWill not fix
Red Hat Software Collectionsrh-perl520-perlWill not fix
Red Hat Software Collectionsrh-perl524-perlWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1354386perl: XSLoader loads relative paths not included in @INC

EPSS

Процентиль: 48%
0.00246
Низкий

7.3 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

CVSS3: 7.8
nvd
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

CVSS3: 7.8
debian
больше 9 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate ...

CVSS3: 7.8
github
больше 3 лет назад

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

suse-cvrf
больше 9 лет назад

Security update for perl

EPSS

Процентиль: 48%
0.00246
Низкий

7.3 High

CVSS3

6.8 Medium

CVSS2