CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
73.1%
The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a “special unknown cipher” that references an untrusted module in Digest/.
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* |
canonical | ubuntu_linux | 12.10 | cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 13.04 | cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* |
opensuse | opensuse | 11.4 | cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* |
opensuse | opensuse | 12.2 | cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
opensuse | opensuse | 12.3 | cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* |
perlmonks | module\ | cpe:2.3:a:perlmonks:module\:\:signature:*:*:*:*:*:perl:*:* | |
perlmonks | module\ | cpe:2.3:a:perlmonks:module\:\:signature:0.70:*:*:*:*:perl:*:* | |
perlmonks | module\ | cpe:2.3:a:perlmonks:module\:\:signature:0.71:*:*:*:*:perl:*:* |
lists.opensuse.org/opensuse-updates/2013-07/msg00039.html
lists.opensuse.org/opensuse-updates/2013-07/msg00043.html
www.openwall.com/lists/oss-security/2013/06/05/16
www.securityfocus.com/bid/60352
www.ubuntu.com/usn/USN-1896-1
bugzilla.redhat.com/show_bug.cgi?id=971096
github.com/audreyt/module-signature/commit/575f7bd6ba4cc7c92f841e8758f88a131674ebf2
github.com/audreyt/module-signature/commit/cbd06b392a73c63159dc5c20ff5b3c8fc88c4896