CVE-2013-2145

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:perlmonks:module\:\:signature:*:*:*:*:*:perl:*:*
cpe:2.3:a:perlmonks:module\:\:signature:0.70:*:*:*:*:perl:*:*
cpe:2.3:a:perlmonks:module\:\:signature:0.71:*:*:*:*:perl:*:*

Information

Published : 2013-08-19 16:55

Updated : 2018-10-30 09:27


NVD link : CVE-2013-2145

Mitre link : CVE-2013-2145


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

canonical

  • ubuntu_linux

opensuse

  • opensuse

perlmonks

  • module\