Search for vulnerabilities
Vulnerability details: VCID-uryf-cs6f-aaaj
Vulnerability ID VCID-uryf-cs6f-aaaj
Aliases CVE-2004-0452
Summary Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2005:103
rhas Important https://access.redhat.com/errata/RHSA-2005:105
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
epss 0.0007 https://api.first.org/data/v1/epss?cve=CVE-2004-0452
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1618363
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2004-0452
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://fedoranews.org/updates/FEDORA--.shtml
http://marc.info/?l=bugtraq&m=110547693019788&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0452.json
https://api.first.org/data/v1/epss?cve=CVE-2004-0452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452
http://secunia.com/advisories/12991
http://secunia.com/advisories/18517
http://secunia.com/advisories/55314
https://exchange.xforce.ibmcloud.com/vulnerabilities/18650
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938
https://www.ubuntu.com/usn/usn-44-1/
http://www.debian.org/security/2004/dsa-620
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
http://www.redhat.com/support/errata/RHSA-2005-103.html
http://www.redhat.com/support/errata/RHSA-2005-105.html
http://www.securityfocus.com/bid/12072
1618363 https://bugzilla.redhat.com/show_bug.cgi?id=1618363
cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
CVE-2004-0452 https://nvd.nist.gov/vuln/detail/CVE-2004-0452
RHSA-2005:103 https://access.redhat.com/errata/RHSA-2005:103
RHSA-2005:105 https://access.redhat.com/errata/RHSA-2005:105
USN-44-1 https://usn.ubuntu.com/44-1/
No exploits are available.
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2004-0452
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.10982
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.