[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2016-10374 -- perltidy

ID: oval:org.secpod.oval:def:1900467Date: (C)2019-02-28   (M)2023-12-20
Class: VULNERABILITYFamily: unix




perltidy through 20160302, as used by perl critic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete.

Platform:
Ubuntu 16.04
Ubuntu 14.04
Product:
perltidy
Reference:
CVE-2016-10374
CVE    1
CVE-2016-10374
CPE    3
cpe:/o:ubuntu:ubuntu_linux:16.04
cpe:/a:perltidy:perltidy
cpe:/o:ubuntu:ubuntu_linux:14.04

© SecPod Technologies