Debian Security Advisory
DSA-034-1 ePerl -- remote root exploit
- Date Reported:
- 07 Mar 2001
- Affected Packages:
- eperl
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 2464.
In Mitre's CVE dictionary: CVE-2001-0458. - More information:
- Fumitoshi Ukai and Denis Barbier have found several
potential buffer overflow bugs in our version of ePerl as distributed in all of
our distributions.
When eperl is installed setuid root, it can switch to the UID/GID of the scripts owner. Although Debian doesn't ship the program setuid root, this is a useful feature which people may have activated locally. When the program is used as /usr/lib/cgi-bin/nph-eperl the bugs could lead into a remote vulnerability as well.
Version 2.2.14-0.7potato2 fixes this; we recommend you upgrade your eperl package immediately.
- Fixed in:
-
Debian 2.2 (potato)
- Source:
-
http://security.debian.org/dists/stable/updates/main/source/eperl_2.2.14-0.7potato2.diff.gz
-
http://security.debian.org/dists/stable/updates/main/source/eperl_2.2.14-0.7potato2.dsc
-
http://security.debian.org/dists/stable/updates/main/source/eperl_2.2.14.orig.tar.gz
- alpha:
-
http://security.debian.org/dists/stable/updates/main/binary-alpha/eperl_2.2.14-0.7potato2_alpha.deb
- arm:
-
http://security.debian.org/dists/stable/updates/main/binary-arm/eperl_2.2.14-0.7potato2_arm.deb
- i386:
-
http://security.debian.org/dists/stable/updates/main/binary-i386/eperl_2.2.14-0.7potato2_i386.deb
- m68k:
-
http://security.debian.org/dists/stable/updates/main/binary-m68k/eperl_2.2.14-0.7potato2_m68k.deb
- powerpc:
-
http://security.debian.org/dists/stable/updates/main/binary-powerpc/eperl_2.2.14-0.7potato2_powerpc.deb
- sparc:
-
http://security.debian.org/dists/stable/updates/main/binary-sparc/eperl_2.2.14-0.7potato2_sparc.deb