7.8
CVSSv3

CVE-2016-6185

Published: 02/08/2016 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl

fedoraproject fedora 22

fedoraproject fedora 24

fedoraproject fedora 23

debian debian linux 8.0

oracle solaris 11.3

oracle solaris 10

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

canonical ubuntu linux 17.10

canonical ubuntu linux 14.04

Vendor Advisories

Debian Bug report logs - #829578 perl: CVE-2016-6185: XSLoader tries to load code from '(eval 1)/' when called inside a string eval Package: perl; Maintainer for perl is Niko Tyni <ntyni@debianorg>; Source for perl is src:perl (PTS, buildd, popcon) Affects: check-all-the-things Reported by: Jakub Wilk <jwilk@debianorg&gt ...
Several security issues were fixed in Perl ...
Several security issues were fixed in Perl ...
Multiple vulnerabilities were discovered in the implementation of the Perl programming language The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-1238 John Lightsey and Todd Rinaldo reported that the opportunistic loading of optional modules can make many programs unintentionally load code fr ...
The XSLoader::load method in XSLoader in Perl does not properly locate so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory ...