CVE-2005-0448

N/A Unknown
Published: May 02, 2005 Modified: April 16, 2026
View on NVD

Description

Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/14531
Source: security@debian.org
http://secunia.com/advisories/17079
Source: security@debian.org
http://secunia.com/advisories/18075
Source: security@debian.org
http://secunia.com/advisories/18517
Source: security@debian.org
http://secunia.com/advisories/55314
Source: security@debian.org
http://www.debian.org/security/2005/dsa-696
Source: security@debian.org
Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
Source: security@debian.org
Patch Vendor Advisory
http://www.securityfocus.com/bid/12767
Source: security@debian.org
https://usn.ubuntu.com/94-1/
Source: security@debian.org
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
Source: af854a3a-2127-422b-91ae-364da2661108
http://fedoranews.org/updates/FEDORA--.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/14531
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/17079
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18075
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18517
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/55314
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-696
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:079
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-674.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-881.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/advisories/8704
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/12767
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/94-1/
Source: af854a3a-2127-422b-91ae-364da2661108

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
26th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

larry_wall