Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/rh50-errata-general.html#perl | broken link |
http://marc.info/?l=bugtraq&m=88932165406213&w=2 | mailing list exploit |
http://www.iss.net/security_center/static/7243.php | vdb entry broken link |