Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-36770

Опубликовано: 11 авг. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

РелизСтатусПримечание
bionic

not-affected

2.96-1
devel

needed

esm-apps/bionic

not-affected

2.96-1
esm-apps/focal

not-affected

3.02-1
esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

not-affected

3.02-1
groovy

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

not-affected

5.26.1-6ubuntu0.5
devel

released

5.32.1-3ubuntu3
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

5.26.1-6ubuntu0.5
esm-infra/focal

not-affected

5.30.0-9ubuntu0.2
esm-infra/xenial

not-affected

focal

not-affected

5.30.0-9ubuntu0.2
groovy

ignored

end of life
hirsute

released

5.32.1-3ubuntu2.1
impish

released

5.32.1-3ubuntu3

Показывать по

EPSS

Процентиль: 36%
0.00149
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 7.8
nvd
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 7.8
debian
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users t ...

CVSS3: 7.8
github
больше 3 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость модуля Encode.pm интерпретатора языка программирования Perl, позволяющая нарушителю внедрить произвольный код и повысить свои привилегии

EPSS

Процентиль: 36%
0.00149
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3