Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 14.10 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 15.04 | |
module-signature | le | 0.74 |
ubuntu.com/usn/usn-2607-1
www.debian.org/security/2015/dsa-3261
www.openwall.com/lists/oss-security/2015/04/07/1
www.openwall.com/lists/oss-security/2015/04/23/17
www.securityfocus.com/bid/73937
github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef
metacpan.org/changes/distribution/Module-Signature