what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

caldera.sa-1998.07.perl

caldera.sa-1998.07.perl
Posted Sep 23, 1999

caldera.sa-1998.07.perl

tags | perl
SHA-256 | 6b7acc89a7d6c3bbb9f35aada6b7353164db74b8709be8cc7ecf36aaa50000e9

caldera.sa-1998.07.perl

Change Mirror Download

From support@caldera.com Thu Apr 9 13:24:35 1998
From: Caldera Support <support@caldera.com>
To: Caldera Announce <caldera-announce@rim.caldera.com>
Date: 9 Apr 1998 17:34:52 -0000
Reply-To: info@caldera.com
Subject: Caldera Security Advisory SA-1998.07: Vulnerability in perl

-----BEGIN PGP SIGNED MESSAGE-----

Subject: Caldera Security Advisory SA-1998.07: Vulnerability in perl

Advisory issue date: 07-Apr-1998

Topic: Vulnerability in perl


I. Problem Description

A race condition exists when executing `perl -e ...'.
This can be used in a DoS (Denial of Service) attack
which deletes the content of a targeted file.

II. Impact

The target file can be harmed if the user executing
`perl -e' has write permissions for the file. The
contents will be replaced with the text of the argument
for `-e' option. This attack is likely to have one of two
results. A file which is needed for normal system operation
is destroyed rendering machine services inaccessible (DoS).
A file controlling access to the machine is modified to
allow access to the attacker (Compromise). The likelihood
of successful compromise attacks are remote as they usually
require that the attacker modify the argument paired with the
'-e' flag.

This problem is present in OpenLinux 1.2 and prior releases.

III. Solution

Upgrade to the perl-5.004_03-2 packages. They can be found
on Caldera's FTP site at:

ftp://ftp.caldera.com/pub/OpenLinux/updates/1.2/005/RPMS

The corresponding source code can be found at:

ftp://ftp.caldera.com/pub/OpenLinux/updates/1.2/005/SRPMS

The MD5 checksums (from the "md5sum" command) for these packages are:

bb5ad759caafc145ed127cf57e5d0c1f perl-5.004_03-2.i386.rpm
116500196267424d5ae1898389242654 perl-add-5.004_03-2.i386.rpm
552ebc8c59f6c05e4576d727b3132d4e perl-examples-5.004_03-2.i386.rpm
edf5c15d0b18677d89e23cada18b3d5d perl-man-5.004_03-2.i386.rpm
b06a442baec601c58f5f8ec7c2eef5fc perl-pod-5.004_03-2.i386.rpm
d663727f82da3b9f45568ab5fc148a50 perl-5.004_03-2.src.rpm

Upgrade with the following commands:

rpm -q perl && rpm -U perl-5.004_03-2.i386.rpm
rpm -q perl-add && rpm -U perl-add-5.004_03-2.i386.rpm
rpm -q perl-examples && rpm -U perl-examples-5.004_03-2.i386.rpm
rpm -q perl-man && rpm -U perl-man-5.004_03-2.i386.rpm
rpm -q perl-pod && rpm -U perl-pod-5.004_03-2.i386.rpm

IV. References

BugTraq reference:
From: stanislav shalunov <shalunov@MCCME.RU>
To: BUGTRAQ@NETSPACE.ORG
Subject: another /tmp race: `perl -e' opens temp file not safely
Date: Sun, 8 Mar 1998 00:04:20 GMT
Message-ID: <199803072356.CAA16643@main.mccme.rssi.ru>
and follow-up postings

This and other Caldera security resources are located at:

http://www.caldera.com/tech-ref/security/

This security fix closes Caldera's internal Problem Report 1810

V. PGP Signature

This message was signed with the PGP key for security@caldera.com.

This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/

Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNSwE9en+9R4958LpAQF8fwP+NN/0Xo4weZgTnc04ilkYvI3AIN8Iu3c9
hIajjL8/AChw9ZokzVIUlpCcpy4zr89gwT0xuhURwqZIDZcdnPAI+FDlxpZO2eH5
IRMgUlfp9jiQAkwa95U8pRhifCrf6BcyqJze3V5x/mrh6gU8bDH3r6IaCyaJt7kQ
u47ZMoQWIZE=
=gPQ+
-----END PGP SIGNATURE-----

-
Notes: To learn how to use this list server, email a "help" command to
majordomo@rim.caldera.com.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close