CVE-2005-4278

Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*

Information

Published : 2005-12-16 03:03

Updated : 2013-10-23 18:56


NVD link : CVE-2005-4278

Mitre link : CVE-2005-4278


JSON object : View

Advertisement

dedicated server usa

Products Affected

larry_wall

  • perl