Search for vulnerabilities
Vulnerability details: VCID-uthe-jghf-aaae
Vulnerability ID VCID-uthe-jghf-aaae
Aliases CVE-2005-0448
Summary Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Low https://access.redhat.com/errata/RHSA-2005:674
rhas Moderate https://access.redhat.com/errata/RHSA-2005:881
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
epss 0.00084 https://api.first.org/data/v1/epss?cve=CVE-2005-0448
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1617524
cvssv2 1.2 https://nvd.nist.gov/vuln/detail/CVE-2005-0448
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
http://fedoranews.org/updates/FEDORA--.shtml
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0448.json
https://api.first.org/data/v1/epss?cve=CVE-2005-0448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0448
http://secunia.com/advisories/14531
http://secunia.com/advisories/17079
http://secunia.com/advisories/18075
http://secunia.com/advisories/18517
http://secunia.com/advisories/55314
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728
https://usn.ubuntu.com/94-1/
http://www.debian.org/security/2005/dsa-696
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:079
http://www.redhat.com/support/errata/RHSA-2005-674.html
http://www.redhat.com/support/errata/RHSA-2005-881.html
http://www.securityfocus.com/advisories/8704
http://www.securityfocus.com/bid/12767
1617524 https://bugzilla.redhat.com/show_bug.cgi?id=1617524
cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
CVE-2005-0448 https://nvd.nist.gov/vuln/detail/CVE-2005-0448
RHSA-2005:674 https://access.redhat.com/errata/RHSA-2005:674
RHSA-2005:881 https://access.redhat.com/errata/RHSA-2005:881
No exploits are available.
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2005-0448
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.27633
EPSS Score 0.00062
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.