CVE-2004-0452
CVSS2.6
发布时间 :2004-12-21 00:00:00
修订时间 :2016-10-17 22:45:26
NMCOPS    

[原文]Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.


[CNNVD]Perl RMTree本地竞态条件漏洞(CNNVD-200412-080)

        Perl 5.6.1和5.8.4版本的文件::路径模块中的rmtree函数的竞态条件存在漏洞。本地用户借助符号连接攻击删除任意文件和目录且可能读取文件和目录。
        

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:larry_wall:perl:5.8.4
cpe:/a:larry_wall:perl:5.6.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9938Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allo...
oval:org.mitre.oval:def:7799DSA-1678 perl -- design flaws
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0452
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-080
(官方数据源) CNNVD

- 其它链接及资源

ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
(UNKNOWN)  SGI  20060101-01-U
http://fedoranews.org/updates/FEDORA--.shtml
(UNKNOWN)  FEDORA  FLSA-2006:152845
http://marc.free.net.ph/message/20041221.102713.5d5e603a.html
(VENDOR_ADVISORY)  UBUNTU  USN-44-1
http://marc.info/?l=bugtraq&m=110547693019788&w=2
(UNKNOWN)  BUGTRAQ  20050111 [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl)
http://www.debian.org/security/2004/dsa-620
(VENDOR_ADVISORY)  DEBIAN  DSA-620
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200501-38
http://www.redhat.com/support/errata/RHSA-2005-103.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:103
http://www.redhat.com/support/errata/RHSA-2005-105.html
(UNKNOWN)  REDHAT  RHSA-2005:105
http://www.securityfocus.com/bid/12072
(UNKNOWN)  BID  12072
http://xforce.iss.net/xforce/xfdb/18650
(UNKNOWN)  XF  perl-filepathrmtree-insecure-permissions(18650)

- 漏洞信息

Perl RMTree本地竞态条件漏洞
低危 竞争条件
2004-12-21 00:00:00 2005-10-20 00:00:00
本地  
        Perl 5.6.1和5.8.4版本的文件::路径模块中的rmtree函数的竞态条件存在漏洞。本地用户借助符号连接攻击删除任意文件和目录且可能读取文件和目录。
        

- 公告与补丁

        The vendor has released Perl version 5.8.4-5 to address this vulnerability. Please contact the vendor for details.
        Please see the referenced advisories for more information.
        
        Larry Wall Perl 5.6.1
        

- 漏洞信息 (F35464)

Ubuntu Security Notice 44-1 (PacketStormID:F35464)
2004-12-31 00:00:00
Ubuntu  security.ubuntu.com
advisory,perl
linux,ubuntu
CVE-2004-0452
[点击下载]

Ubuntu Security Notice USN-44-1 - A race condition and possible information leak has been discovered in Perl's File::Path::rmtree(). This function changes the permission of files and directories before removing them to avoid problems with wrong permissions. However, they were made readable and writable not only for the owner, but for the entire world, which opened a race condition and a possible information leak (if the actual removal of a file/directory failed for some reason).

--Yylu36WmvOXNoKYn
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

===========================================================
Ubuntu Security Notice USN-44-1		  December 21, 2004
perl vulnerabilities
CAN-2004-0452
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

perl-modules

The problem can be corrected by upgrading the affected package to
version 5.8.4-2ubuntu0.2. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

A race condition and possible information leak has been discovered in
Perl's File::Path::rmtree(). This function changes the permission of
files and directories before removing them to avoid problems with
wrong permissions. However, they were made readable and writable not
only for the owner, but for the entire world, which opened a race
condition and a possible information leak (if the actual removal of a
file/directory failed for some reason).

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.2.diff.gz
      Size/MD5:    57275 7c5bfeaebe727e706b2f5187a83ca30d
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.2.dsc
      Size/MD5:      727 f9f33d4fff77573d6dcf4b06bc360837
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4.orig.tar.gz
      Size/MD5: 12094233 912050a9cb6b0f415b76ba56052fb4cf

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/universe/p/perl/libcgi-fast-perl_5.8.4-2ubuntu0.2_all.deb
      Size/MD5:    36536 a00d1cd79825a29cb0711563b9c3e090
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-doc_5.8.4-2ubuntu0.2_all.deb
      Size/MD5:  7049930 0a95b9e57ea618a92c1d7dcf5f2acf68
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-modules_5.8.4-2ubuntu0.2_all.deb
      Size/MD5:  2181378 13957c0f2d39068891ec94c2b6ca8e21

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:   605384 cf119880fc05c4f39b88020906853153
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:     1030 f945f03d278b406e7002d7ca2a9daa7d
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:   786796 04cec9bde93828ae970a50f0c17d742c
    http://security.ubuntu.com/ubuntu/pool/universe/p/perl/perl-debug_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:  3819858 e399fb65322565bea74b1c368376e0a9
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-suid_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:    32834 2fdd6630ed9734ecf52175317abd73bb
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.2_amd64.deb
      Size/MD5:  3834294 8c2bc2159adf44eaa11c00ed822dcbe2

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:   546846 c280e92bca69e4d35afec165f269548c
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:   494038 3bef54ba7fd432eaa2eb8f457bd76c16
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:   727156 7db0cb83924058566c96008473c62e48
    http://security.ubuntu.com/ubuntu/pool/universe/p/perl/perl-debug_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:  3631004 fe315ecd0b69a9b36bc06b8fd4ce696a
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-suid_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:    30814 2c399de025ab3beda085d2a1ccb53450
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.2_i386.deb
      Size/MD5:  3229768 4bb3ed09adcd85a543472aab7ca9225a

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:   560978 bf01c6b3573261f5b44aa20b75ac0747
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:     1032 c6b483f4ec3021bb9d198a566d017e86
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:   718122 f4b86a11865691a5aa54329530bac295
    http://security.ubuntu.com/ubuntu/pool/universe/p/perl/perl-debug_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:  3817060 904ec3058d81e037e086c3eeb9a1cc39
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-suid_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:    30560 47a80c652b51ce2042eeaa4ae5919346
    http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.2_powerpc.deb
      Size/MD5:  3477172 6412491bf1c5aad614efdf142daaf667

--Yylu36WmvOXNoKYn
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBx/qBDecnbV4Fd/IRAjvPAJ9RAvdPyyi1TWrUcUgVfc2ETZ6SXgCeKAzK
gFjuFRG86OvWWSyoQZIYulA=
=t68T
-----END PGP SIGNATURE-----

--Yylu36WmvOXNoKYn--
    

- 漏洞信息

12588
Perl File::Path::rmtree Symlink Arbitrary File/Directory Manipulation
Local Access Required Race Condition
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

File::Path::rmtree contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a malicious user creates symbolic links to arbitrary files and File::Path::rmtree attempts to delete the arbitrary file. This flaw may lead to a loss of integrity, possibly allowing the attacker change permissions and/or delete the file.

- 时间线

2004-12-26 2004-12-23
2004-12-23 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Perl RMTree Local Race Condition Vulnerability
Race Condition Error 12072
No Yes
2004-12-21 12:00:00 2006-08-17 02:35:00
The researcher that discovered this vulnerability is not known.

- 受影响的程序版本

Ubuntu Ubuntu Linux 4.1 ppc
Ubuntu Ubuntu Linux 4.1 ia64
Ubuntu Ubuntu Linux 4.1 ia32
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
OpenPKG OpenPKG 2.2
OpenPKG OpenPKG 2.1
OpenPKG OpenPKG Current
Larry Wall Perl 5.8.4 -4
Larry Wall Perl 5.8.4 -3
Larry Wall Perl 5.8.4 -2.3
Larry Wall Perl 5.8.4 -2
Larry Wall Perl 5.8.4 -1
Larry Wall Perl 5.8.4
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
Larry Wall Perl 5.8.3
+ Gentoo Linux
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
Larry Wall Perl 5.6.1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Larry Wall Perl 5.6
+ Mandriva Linux Mandrake 7.1
Larry Wall Perl 5.0 05_003
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2
+ Debian Linux 2.1 sparc
+ Debian Linux 2.1 alpha
+ Debian Linux 2.1 68k
+ Debian Linux 2.1
+ Mandriva Linux Mandrake 7.0
+ Mandriva Linux Mandrake 6.1
+ Mandriva Linux Mandrake 6.0
+ RedHat Linux 6.2 E sparc
+ RedHat Linux 6.2 E i386
+ RedHat Linux 6.2 E alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ RedHat Linux 6.1 sparc
+ RedHat Linux 6.1 i386
+ RedHat Linux 6.1 alpha
+ RedHat Linux 6.0 sparc
+ RedHat Linux 6.0 alpha
+ RedHat Linux 6.0
+ SCO eDesktop 2.4
+ SCO eServer 2.3
+ Trustix Trustix Secure Linux 1.1
+ Turbolinux Turbolinux 6.0.4
+ Turbolinux Turbolinux 6.0.3
+ Turbolinux Turbolinux 6.0.2
+ Turbolinux Turbolinux 6.0.1
+ Turbolinux Turbolinux 6.0
+ Turbolinux Turbolinux 4.4
+ Turbolinux Turbolinux 4.2
+ Turbolinux Turbolinux 4.0
Larry Wall Perl 5.0 05
Larry Wall Perl 5.0 04_05
+ RedHat Linux 5.2 sparc
+ RedHat Linux 5.2 i386
+ RedHat Linux 5.2 alpha
+ RedHat Linux 5.1
+ RedHat Linux 5.0
Larry Wall Perl 5.0 04_04
Larry Wall Perl 5.0 04
Larry Wall Perl 5.0 03
Gentoo Linux 1.4 _rc3
Gentoo Linux 1.4 _rc2
Gentoo Linux 1.4 _rc1
Gentoo Linux 1.4
Gentoo Linux 1.2
Gentoo Linux 1.1 a
Gentoo Linux 0.7
Gentoo Linux 0.5
Gentoo Linux
Larry Wall Perl 5.8.4 -5

- 不受影响的程序版本

Larry Wall Perl 5.8.4 -5

- 漏洞讨论

Perl is reported prone to a local race condition. The vulnerability is present in the 'rmtree()' function provided by the 'File::Path' module.

A local attacker may exploit this condition to disclose potentially sensitive data, or to launch other attacks against an application that employs the vulnerable function.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released Perl version 5.8.4-5 to address this vulnerability. Please contact the vendor for details.

Please see the referenced advisories for more information.


Larry Wall Perl 5.6.1

Larry Wall Perl 5.8

Larry Wall Perl 5.8.1

Larry Wall Perl 5.8.3

Larry Wall Perl 5.8.4

Larry Wall Perl 5.8.4 -4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站