4.4
CVSSv2

CVE-2013-2145

Published: 19/08/2013 Updated: 30/10/2018
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The cpansign verify functionality in the Module::Signature module prior to 0.72 for Perl allows malicious users to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 12.10

canonical ubuntu linux 13.04

canonical ubuntu linux 12.04

opensuse opensuse 11.4

opensuse opensuse 12.2

opensuse opensuse 12.3

perlmonks module\\ \\

Vendor Advisories

Debian Bug report logs - #711239 libmodule-signature-perl: CVE-2013-2145: arbitrary code execution when verifying SIGNATURE Package: libmodule-signature-perl; Maintainer for libmodule-signature-perl is Debian Perl Group <pkg-perl-maintainers@listsaliothdebianorg>; Source for libmodule-signature-perl is src:libmodule-signature-per ...
Module::Signature could be made to run programs if it verified a signature ...