CVE-2013-2145

The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
VendorProductVersion
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.04
opensuseopensuse
11.4
opensuseopensuse
12.2
opensuseopensuse
12.3
perlmonksmodule\
𝑥
≤ 0.72
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libmodule-signature-perl
bullseye
0.87-1
fixed
bookworm
0.88-2
fixed
sid
0.89-1
fixed
trixie
0.89-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libmodule-signature-perl
raring
Fixed 0.68-1ubuntu0.13.04.1
released
quantal
Fixed 0.68-1ubuntu0.12.10.1
released
precise
Fixed 0.68-1ubuntu0.12.04.1
released
lucid
ignored