CVE-2013-2145Improper Input Validation in Libmodule-signature-perl

Severity
4.4MEDIUMNVD
EPSS
0.2%
top 58.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 19
Latest updateMay 14

Description

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages3 packages

debiandebian/libmodule-signature-perl< libmodule-signature-perl 0.73-1 (bookworm)
NVDperlmonks/module0.72+1
NVDopensuse/opensuse11.4, 12.2, 12.3+2

Also affects: Ubuntu Linux 12.04, 12.10, 13.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-99g4-3v63-xpqx: The cpansign verify functionality in the Module::Signature module before 02022-05-14
OSV
CVE-2013-2145: The cpansign verify functionality in the Module::Signature module before 02013-08-19

📋Vendor Advisories

2
Ubuntu
Module::Signature perl module vulnerability2013-07-03
Debian
CVE-2013-2145: libmodule-signature-perl - The cpansign verify functionality in the Module::Signature module before 0.72 fo...2013

💬Community

3
Bugzilla
CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE [epel-all]2013-06-05
Bugzilla
CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE2013-06-05
Bugzilla
CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE [fedora-all]2013-06-05