CVE-2013-2145

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:perlmonks:module\:\:signature:*:*:*:*:*:perl:*:*
cpe:2.3:a:perlmonks:module\:\:signature:0.70:*:*:*:*:perl:*:*
cpe:2.3:a:perlmonks:module\:\:signature:0.71:*:*:*:*:perl:*:*

History

No history.

Information

Published : 2013-08-19 23:55

Updated : 2024-02-04 18:16


NVD link : CVE-2013-2145

Mitre link : CVE-2013-2145

CVE.ORG link : CVE-2013-2145


JSON object : View

Products Affected

perlmonks

  • module\

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-20

Improper Input Validation