Skip to navigation

CVE Database

CVE-2013-2145

Impact: Moderate
Public: 2013-06-04
Bugzilla: 971096: CVE-2013-2145 perl-Module-Signature: arbitrary code execution when verifying SIGNATURE

Details

The MITRE CVE dictionary describes this issue as:

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.

Find out more about CVE-2013-2145 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score: 3.7
Base Metrics: AV:L/AC:H/Au:N/C:P/I:P/A:P
Access Vector: Local
Access Complexity: High
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date

External References

Acknowledgements

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.