suid_perl 5.001 vulnerability
Description: On systems that support saved set-user-IDs, perl isn't thorough enough in giving up its root priviledges.
Author: Jon Lewis (email@example.com) wrote this basic exploit, though it has been modified. It is unclear who found the hole.
Compromise: root (local)
Vulnerable Systems: Systems that support saved set-user-IDs and set-group-IDs and have suid_perl 5.001 (and possibly below) installed. Many linux and *BSD boxes.
Date: June 1996
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resouces: [
Sec Tools |
Mailing Lists |
Site News |
Advertising ] Privacy