Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
2005-12-16T11:03:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | larry_wall | perl | ≤ 5.8.6 | Yes |
Application | larry_wall | perl | 5.3 | Yes |
Application | larry_wall | perl | 5.4 | Yes |
Application | larry_wall | perl | 5.4.5 | Yes |
Application | larry_wall | perl | 5.5 | Yes |
Application | larry_wall | perl | 5.5.3 | Yes |
Application | larry_wall | perl | 5.6.1 | Yes |
Application | larry_wall | perl | 5.8.0 | Yes |
Application | larry_wall | perl | 5.8.1 | Yes |
Application | larry_wall | perl | 5.8.3 | Yes |
Application | larry_wall | perl | 5.8.4 | Yes |
Application | larry_wall | perl | 5.8.4.1 | Yes |
Application | larry_wall | perl | 5.8.4.2 | Yes |
Application | larry_wall | perl | 5.8.4.2.3 | Yes |
Application | larry_wall | perl | 5.8.4.3 | Yes |
Application | larry_wall | perl | 5.8.4.4 | Yes |
Application | larry_wall | perl | 5.8.4.5 | Yes |