Vulnerability Description
The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Detlef Pilzecker | Proc\ | \ |
Related Weaknesses (CWE)
References
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:021
- http://www.openwall.com/lists/oss-security/2013/12/16/5
- http://www.openwall.com/lists/oss-security/2013/12/18/2
- http://www.openwall.com/lists/oss-security/2014/01/07/7
- https://rt.cpan.org/Public/Bug/Display.html?id=91450
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:021
- http://www.openwall.com/lists/oss-security/2013/12/16/5
- http://www.openwall.com/lists/oss-security/2013/12/18/2
- http://www.openwall.com/lists/oss-security/2014/01/07/7
- https://rt.cpan.org/Public/Bug/Display.html?id=91450
FAQ
What is CVE-2013-7135?
CVE-2013-7135 is a vulnerability with a CVSS score of 7.2 (HIGH). The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.
How severe is CVE-2013-7135?
CVE-2013-7135 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7135?
Check the references section above for vendor advisories and patch information. Affected products include: Detlef Pilzecker Proc\.