Upstream information

CVE-2013-2145 at MITRE

Description

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.4
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 828010 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2013:1178-1 openSUSE-SU-2013:1185-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • perl-Module-Signature >= 0.81-1.1
Patchnames:
openSUSE Tumbleweed GA perl-Module-Signature-0.81-1.1


SUSE Timeline for this CVE

CVE page created: Wed Jul 3 18:29:28 2013
CVE page last modified: Thu Dec 7 13:06:13 2023