Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0156

Опубликовано: 07 фев. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1

Описание

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

РелизСтатусПримечание
dapper

released

5.8.7-10ubuntu1
devel

released

5.8.7-10ubuntu1
edgy

released

5.8.7-10ubuntu1
feisty

released

5.8.7-10ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 59%
0.00386
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

nvd
больше 20 лет назад

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

debian
больше 20 лет назад

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when insta ...

github
больше 3 лет назад

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

EPSS

Процентиль: 59%
0.00386
Низкий

2.1 Low

CVSS2