Vulnerability Details : CVE-2016-6185
Potential exploit
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
Vulnerability category: Execute code
Products affected by CVE-2016-6185
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6185
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6185
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2016-6185
-
http://www.securityfocus.com/bid/91685
Perl CVE-2016-6185 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2016/07/07/1
oss-security - CVE Request: perl: XSLoader: could load shared library from incorrect locationMailing List;Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Oracle Solaris Bulletin - July 2016Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
[SECURITY] Fedora 23 Update: perl-5.22.2-353.fc23 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
Perl 5 - perl.git/commitdiffIssue Tracking;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
[SECURITY] Fedora 22 Update: perl-5.20.3-332.fc22 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.debian.org/security/2016/dsa-3628
Debian -- Security Information -- DSA-3628-1 perlThird Party Advisory
-
https://usn.ubuntu.com/3625-2/
USN-3625-2: Perl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.securitytracker.com/id/1036260
Perl XSLoader Relative Path Error Lets Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2016/07/08/5
oss-security - Re: CVE Request: perl: XSLoader: could load shared library from incorrect locationMailing List;Third Party Advisory
-
https://rt.cpan.org/Public/Bug/Display.html?id=115808
Bug #115808 for List-MoreUtils: Tries to load code from cwdExploit;Issue Tracking;Patch;Third Party Advisory
-
https://usn.ubuntu.com/3625-1/
USN-3625-1: Perl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://security.gentoo.org/glsa/201701-75
Perl: Multiple vulnerabilities (GLSA 201701-75) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
[SECURITY] Fedora 24 Update: perl-5.22.2-361.fc24 - package-announce - Fedora Mailing-ListsThird Party Advisory
Jump to