2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4278" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-16T11:03:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 01:07:11 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 01:07:11 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "5.8.6" ,
"matchCriteriaId" : "BB5869CF-E0BD-4091-B7AA-7722F39EAF0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6D64BFC-E974-460C-A635-7319676049A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FBFF691-770C-4181-BB40-14BD1B90F705"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7EF5BB8-FFEA-4927-A289-3C9A7ADEC6BB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB034FE1-9575-45B4-9E8F-1B068E3ED1CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6D7F3D2-FE93-4F2F-B8FB-F2A7869502FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7530A863-0FFF-4332-8E6F-4329AB4DE5FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D30E072-9E6A-49B4-A5C7-63A328598A68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "434F0580-985F-42AF-BA10-FAB7E2C23ED0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18B179E0-C843-46C9-AAD2-78E998175E41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD5E5A51-ED4C-4927-8C4D-502E79391E19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "171C82CB-2E92-4D41-B1B1-DCFE929E8270"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25633253-D9DE-41F0-A787-D0E8B2B3B9F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEDF9611-E4E2-4059-B45E-D3A61AC9DB47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49A9D197-D889-4BE4-BE7A-2EE9536A7498"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0A4538C-3870-431E-A225-D8523D77A4E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C8233B3A-E09D-425B-B1A1-65CD170FD384"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17232" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/55314" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/20086" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/15120" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2119" ,
"source" : "cve@mitre.org"
2024-11-22 01:07:11 +00:00
} ,
{
"url" : "http://secunia.com/advisories/17232" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/55314" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.osvdb.org/20086" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/15120" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2119" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}