SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
(Red Hat Issues Fix) Perl File::Path.pm rmtree() Race Condition May Let Local Users Create Privileged Binaries
SecurityTracker Alert ID:  1015007
SecurityTracker URL:  http://securitytracker.com/id/1015007
CVE Reference:   CVE-2005-0448   (Links to External Site)
Updated:  Dec 20 2005
Original Entry Date:  Oct 5 2005
Impact:   Modification of system information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.8.4
Description:   In March 2005, a vulnerability was reported in the rmtree() function in File::Path.pm. A local user may be able to create set user id (setuid) binaries in certain cases.

A local user can exploit a race condition to create setuid binaries in a directory tree while the directory tree is being deleted by a root level user. The user must have write permissions in that directory tree to exploit this flaw.

Paul Szabo discovered this vulnerability.

Impact:   A local user can create setuid binaries in certain cases.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

ppc:
89dad8dbc4dc1ca219ad353c0ebce105 perl-5.8.5-16.RHEL4.ppc.rpm
d768e18d710ed0ddf9ff928cd7b62991 perl-suidperl-5.8.5-16.RHEL4.ppc.rpm

s390:
d2b9782e99e123ada2a42c0719d4286b perl-5.8.5-16.RHEL4.s390.rpm
786148799901a80afa9ae8ecd8a08c88 perl-suidperl-5.8.5-16.RHEL4.s390.rpm

s390x:
d2a24c5fbc21634c1242477a1f959df8 perl-5.8.5-16.RHEL4.s390x.rpm
ef1e3ff9dfeb8bb39807841fdabbc3c9 perl-suidperl-5.8.5-16.RHEL4.s390x.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2005-674.html

Cause:   Access control error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Jun 16 2005 Perl File::Path.pm rmtree() Race Condition May Let Local Users Create Privileged Binaries



 Source Message Contents

Subject:  [RHSA-2005:674-01] Low: perl security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: perl security update
Advisory ID:       RHSA-2005:674-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-674.html
Issue date:        2005-10-05
Updated on:        2005-10-05
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0448
- ---------------------------------------------------------------------

1. Summary:

Updated Perl packages that fix security issues and contain several bug
fixes are now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Perl is a high-level programming language commonly used for system     
administration utilities and Web programming.    

Paul Szabo discovered a bug in the way Perl's File::Path::rmtree module
removed directory trees. If a local user has write permissions to a
subdirectory within the tree being removed by File::Path::rmtree, it is
possible for them to create setuid binary files. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0448
to this issue.    

This update also addresses the following issues:

- -- Perl interpreter caused a segmentation fault when environment    
changes occurred during runtime.

- -- Code in lib/FindBin contained a regression that caused problems with  
 MRTG software package.

- -- Perl incorrectly declared it provides an FCGI interface where it in fact
  did not.    

Users of Perl are advised to upgrade to these updated packages, which 
contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

127023 - perl fails "lib/FindBin" test (breaks MRTG)
148848 - Packing fault with perl and FCGI
155888 - perl-suidperl package has an extra .1 release suffix
157694 - CAN-2005-0448 perl File::Path.pm rmtree race condition


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

ppc:
89dad8dbc4dc1ca219ad353c0ebce105  perl-5.8.5-16.RHEL4.ppc.rpm
d768e18d710ed0ddf9ff928cd7b62991  perl-suidperl-5.8.5-16.RHEL4.ppc.rpm

s390:
d2b9782e99e123ada2a42c0719d4286b  perl-5.8.5-16.RHEL4.s390.rpm
786148799901a80afa9ae8ecd8a08c88  perl-suidperl-5.8.5-16.RHEL4.s390.rpm

s390x:
d2a24c5fbc21634c1242477a1f959df8  perl-5.8.5-16.RHEL4.s390x.rpm
ef1e3ff9dfeb8bb39807841fdabbc3c9  perl-suidperl-5.8.5-16.RHEL4.s390x.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDQ9moXlSAg2UNWIIRAvZgAKC90c4MtVjeD1LvpPl/8MQhNMN3LwCggjV0
p5p/44d68tnapR2H6Lh5Yyg=
=/x9M
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC