Vulnerability Bulletins |
Uso de archivos temporales de forma insegura en libdbi-perl |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Integridad |
Dificulty | Principiante |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | libdbi-perl |
Description |
|
Se ha descubierto una vulnerabilidad en la librería DBI de Perl5. La vulnerabilidad reside en que la librería crea archivos temporales de una forma insegura. La explotación de esta vulnerabilidad podría permitir a un atacante local sobrescribir archivos que pertenezcan a un usuario que use la librería. |
|
Solution |
|
Actualización de software Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2.dsc http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2.diff.gz http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_alpha.deb ARM http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_ia64.deb HP Precision http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/libd/libdbi-perl/libdbi-perl_1.21-2woody2_sparc.deb Red Hat Linux Red Hat Desktop (v. 3) SRPMS perl-DBI-1.32-9.src.rpm IA-32 perl-DBI-1.32-9.i386.rpm x86_64 perl-DBI-1.32-9.x86_64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux AS (v. 2.1) SRPMS perl-DBI-1.18-3.src.rpm IA-32 perl-DBI-1.18-3.i386.rpm IA-64 perl-DBI-1.18-3.ia64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux AS (v. 3) SRPMS perl-DBI-1.32-9.src.rpm IA-32 perl-DBI-1.32-9.i386.rpm IA-64 perl-DBI-1.32-9.ia64.rpm PPC perl-DBI-1.32-9.ppc.rpm s390 perl-DBI-1.32-9.s390.rpm s390x perl-DBI-1.32-9.s390x.rpm x86_64 perl-DBI-1.32-9.x86_64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux ES (v. 2.1) SRPMS perl-DBI-1.18-3.src.rpm IA-32 perl-DBI-1.18-3.i386.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux ES (v. 3) SRPMS perl-DBI-1.32-9.src.rpm IA-32 perl-DBI-1.32-9.i386.rpm IA-64 perl-DBI-1.32-9.ia64.rpm x86_64 perl-DBI-1.32-9.x86_64.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux WS (v. 2.1) SRPMS perl-DBI-1.18-3.src.rpm IA-32 perl-DBI-1.18-3.i386.rpm https://rhn.redhat.com/ Red Hat Enterprise Linux WS (v. 3) SRPMS perl-DBI-1.32-9.src.rpm IA-32 perl-DBI-1.32-9.i386.rpm IA-64 perl-DBI-1.32-9.ia64.rpm x86_64 perl-DBI-1.32-9.x86_64.rpm https://rhn.redhat.com/ Red Hat Linux Advanced Workstation 2.1 Itanium Processor SRPMS perl-DBI-1.18-3.src.rpm IA-64 perl-DBI-1.18-3.ia64.rpm https://rhn.redhat.com/ Mandrake Linux Mandrakelinux 9.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/perl-DBI-1.38-1.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/perl-DBI-ProfileDumper-Apache-1.38-1.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/perl-DBI-proxy-1.38-1.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/perl-DBI-1.38-1.1.92mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/perl-DBI-1.38-1.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/perl-DBI-ProfileDumper-Apache-1.38-1.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/perl-DBI-proxy-1.38-1.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/perl-DBI-1.38-1.1.92mdk.src.rpm Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/perl-DBI-1.40-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/perl-DBI-ProfileDumper-Apache-1.40-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/perl-DBI-proxy-1.40-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/perl-DBI-1.40-2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/perl-DBI-1.40-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/perl-DBI-ProfileDumper-Apache-1.40-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/perl-DBI-proxy-1.40-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/perl-DBI-1.40-2.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/perl-DBI-1.43-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/perl-DBI-ProfileDumper-Apache-1.43-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/perl-DBI-proxy-1.43-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/perl-DBI-1.43-2.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/perl-DBI-1.43-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/perl-DBI-ProfileDumper-Apache-1.43-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/perl-DBI-proxy-1.43-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/perl-DBI-1.43-2.1.101mdk.src.rpm Mandrake Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/perl-DBI-1.30-2.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/perl-DBI-1.30-2.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/perl-DBI-1.30-2.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/perl-DBI-1.30-2.1.C21mdk.src.rpm Mandrake Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/perl-DBI-1.40-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/perl-DBI-ProfileDumper-Apache-1.40-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/perl-DBI-proxy-1.40-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/perl-DBI-1.40-2.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/perl-DBI-1.40-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/perl-DBI-ProfileDumper-Apache-1.40-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/perl-DBI-proxy-1.40-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/perl-DBI-1.40-2.1.C30mdk.src.rpm SUSE Linux Actualizar mediante YaST Online Update Red Hat Linux Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ |
|
Standar resources |
|
Property | Value |
CVE | CAN-2005-0077 |
BID | |
Other resources |
|
Debian Security Advisory DSA 658-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00036.html Red Hat Security Advisory RHSA-2005:069-08 https://rhn.redhat.com/errata/RHSA-2005-069.html Mandrakesoft Security Advisories MDKSA-2005:030 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:030 SUSE Security Summary Report SUSE-SR:2005:004 http://www.novell.com/linux/security/advisories/2005_04_sr.html Red Hat Security Advisory RHSA-2005:072-07 https://rhn.redhat.com/errata/RHSA-2005-072.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-01-26 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:069-08) | 2005-02-03 |
1.2 | Aviso emitido por Mandrake (MDKSA-2005:030) | 2005-02-09 |
1.3 | Aviso emitido por SUSE (SUSE-SR:2005:004) | 2005-02-14 |
1.4 | Aviso emitido por Red Hat (RHSA-2005:072-07) | 2005-02-16 |