Vulnerability Description
Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Module-Signature Project | Module-Signature | <= 0.73 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://ubuntu.com/usn/usn-2607-1
- http://www.debian.org/security/2015/dsa-3261
- http://www.openwall.com/lists/oss-security/2015/04/07/1
- http://www.openwall.com/lists/oss-security/2015/04/23/17
- https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d
- https://metacpan.org/changes/distribution/Module-Signature
- http://ubuntu.com/usn/usn-2607-1
- http://www.debian.org/security/2015/dsa-3261
- http://www.openwall.com/lists/oss-security/2015/04/07/1
- http://www.openwall.com/lists/oss-security/2015/04/23/17
- https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d
- https://metacpan.org/changes/distribution/Module-Signature
FAQ
What is CVE-2015-3408?
CVE-2015-3408 is a vulnerability with a CVSS score of 10.0 (HIGH). Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
How severe is CVE-2015-3408?
CVE-2015-3408 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3408?
Check the references section above for vendor advisories and patch information. Affected products include: Module-Signature Project Module-Signature, Canonical Ubuntu Linux.