Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-10374
HistoryMay 17, 2017 - 12:00 a.m.

CVE-2016-10374

2017-05-1700:00:00
ubuntu.com
ubuntu.com
8

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

5.1%

perltidy through 20160302, as used by perlcritic, check-all-the-things, and
other software, relies on the current working directory for certain output
files and does not have a symlink-attack protection mechanism, which allows
local users to overwrite arbitrary files by creating a symlink, as
demonstrated by creating a perltidy.ERR symlink that the victim cannot
delete.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchperltidy< anyUNKNOWN

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

5.1%