7.8 High
AI Score
Confidence
Low
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
34.3%
The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a “special unknown cipher” that references an untrusted module in Digest/.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 13.04 | |
ubuntu_linux | eq | 12.10 | |
ubuntu_linux | eq | 12.4 lts | |
opensuse | eq | 12.3 | |
opensuse | eq | 11.4 | |
opensuse | eq | 12.2 |
lists.opensuse.org/opensuse-updates/2013-07/msg00039.html
lists.opensuse.org/opensuse-updates/2013-07/msg00043.html
www.openwall.com/lists/oss-security/2013/06/05/16
www.securityfocus.com/bid/60352
www.ubuntu.com/usn/USN-1896-1
bugzilla.redhat.com/show_bug.cgi?id=971096
github.com/audreyt/module-signature/commit/575f7bd6ba4cc7c92f841e8758f88a131674ebf2
github.com/audreyt/module-signature/commit/cbd06b392a73c63159dc5c20ff5b3c8fc88c4896