CVE-2016-6185
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/08/2016
Last modified:
12/04/2025
Description
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* | 5.23.0 (including) | 5.24.1 (excluding) |
| cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* | 5.25.0 (including) | 5.25.3 (excluding) |
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
- http://www.debian.org/security/2016/dsa-3628
- http://www.openwall.com/lists/oss-security/2016/07/07/1
- http://www.openwall.com/lists/oss-security/2016/07/08/5
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91685
- http://www.securitytracker.com/id/1036260
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
- https://rt.cpan.org/Public/Bug/Display.html?id=115808
- https://security.gentoo.org/glsa/201701-75
- https://usn.ubuntu.com/3625-1/
- https://usn.ubuntu.com/3625-2/
- http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
- http://www.debian.org/security/2016/dsa-3628
- http://www.openwall.com/lists/oss-security/2016/07/07/1
- http://www.openwall.com/lists/oss-security/2016/07/08/5
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91685
- http://www.securitytracker.com/id/1036260
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
- https://rt.cpan.org/Public/Bug/Display.html?id=115808
- https://security.gentoo.org/glsa/201701-75
- https://usn.ubuntu.com/3625-1/
- https://usn.ubuntu.com/3625-2/



