Vulnerabilities > CVE-2005-0077 - Insecure Temporary File Creation vulnerability in Libdbi-perl

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
local
low complexity
debian
gentoo
redhat
ubuntu
nessus

Summary

The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-069.NASL
    descriptionAn updated perl-DBI package that fixes a temporary file flaw in DBI::ProxyServer is now available. DBI is a database access Application Programming Interface (API) for the Perl programming language. The Debian Security Audit Project discovered that the DBI library creates a temporary PID file in an insecure manner. A local user could overwrite or create files as a different user who happens to run an application which uses DBI::ProxyServer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0077 to this issue. Users should update to this erratum package which disables the temporary PID file unless configured.
    last seen2020-06-01
    modified2020-06-02
    plugin id16298
    published2005-02-02
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/16298
    titleRHEL 2.1 / 3 : perl (RHSA-2005:069)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200501-38.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200501-38 (Perl: rmtree and DBI tmpfile vulnerabilities) Javier Fernandez-Sanguino Pena discovered that the DBI library creates temporary files in an insecure, predictable way (CAN-2005-0077). Paul Szabo found out that
    last seen2020-06-01
    modified2020-06-02
    plugin id16429
    published2005-02-14
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16429
    titleGLSA-200501-38 : Perl: rmtree and DBI tmpfile vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_9838.NASL
    descriptionThis update fixes insecure temp. file handling. (CVE-2005-0077)
    last seen2020-06-01
    modified2020-06-02
    plugin id41346
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41346
    titleSuSE9 Security Update : perl-DBI (YOU Patch Number 9838)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-072.NASL
    descriptionAn updated perl-DBI package that fixes a temporary file flaw in DBI::ProxyServer is now available for Red Hat Enterprise Linux 4. This update has been rated as having low security impact by the Red Hat Security Response Team. DBI is a database access Application Programming Interface (API) for the Perl programming language. The Debian Security Audit Project discovered that the DBI library creates a temporary PID file in an insecure manner. A local user could overwrite or create files as a different user who happens to run an application which uses DBI::ProxyServer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0077 to this issue. Users should update to this erratum package which disables the temporary PID file unless configured.
    last seen2020-06-01
    modified2020-06-02
    plugin id17180
    published2005-02-22
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/17180
    titleRHEL 4 : perl-DBI (RHSA-2005:072)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-70-1.NASL
    descriptionJavier Fernandez-Sanguino Pena from the Debian Security Audit Project discovered that the module DBI::ProxyServer in Perl
    last seen2020-06-01
    modified2020-06-02
    plugin id20691
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20691
    titleUbuntu 4.10 : libdbi-perl vulnerabilities (USN-70-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-658.NASL
    descriptionJavier Fernandez-Sanguino Pena from the Debian Security Audit Project discovered that the DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.
    last seen2020-06-01
    modified2020-06-02
    plugin id16249
    published2005-01-25
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16249
    titleDebian DSA-658-1 : libdbi-perl - insecure temporary file
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_8CFB6F42D2B011DAA672000E0C2E438A.NASL
    descriptionJavier Fernandez-Sanguino Pena reports : The DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.
    last seen2020-06-01
    modified2020-06-02
    plugin id21470
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21470
    titleFreeBSD : p5-DBI -- insecure temporary file creation vulnerability (8cfb6f42-d2b0-11da-a672-000e0c2e438a)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-030.NASL
    descriptionJavier Fernandez-Sanguino Pena disovered the perl5 DBI library created a temporary PID file in an insecure manner, which could be exploited by a malicious user to overwrite arbitrary files owned by the user executing the parts of the library. The updated packages have been patched to prevent these problems.
    last seen2020-06-01
    modified2020-06-02
    plugin id16359
    published2005-02-10
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16359
    titleMandrake Linux Security Advisory : perl-DBI (MDKSA-2005:030)

Oval

accepted2013-04-29T04:06:39.204-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionThe DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
familyunix
idoval:org.mitre.oval:def:10552
statusaccepted
submitted2010-07-09T03:56:16-04:00
titlearch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
version25

Redhat

advisories
rhsa
idRHSA-2005:072
rpms
  • perl-DBI-0:1.32-9
  • perl-DBI-debuginfo-0:1.32-9
  • perl-DBI-0:1.40-8
  • perl-DBI-debuginfo-0:1.40-8