Vulnerability Name: | CVE-2015-3406 (CCN-172724) | ||||||||||||||||||||||||||||
Assigned: | 2015-04-06 | ||||||||||||||||||||||||||||
Published: | 2015-04-06 | ||||||||||||||||||||||||||||
Updated: | 2019-12-16 | ||||||||||||||||||||||||||||
Summary: | The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to cause the unsigned portion of a SIGNATURE file to be treated as the signed portion via unspecified vectors. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-681 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-3406 Source: MISC Type: Patch, Release Notes, Third Party Advisory http://ubuntu.com/usn/usn-2607-1 Source: MISC Type: Mailing List, Patch, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/04/07/1 Source: MISC Type: Mailing List, Patch, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/04/23/17 Source: XF Type: UNKNOWN metacpan-cve20153406-sec-bypass(172724) Source: MISC Type: Patch, Third Party Advisory https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f Source: CCN Type: metacpan Web site Module-Signature Source: MISC Type: Release Notes, Vendor Advisory https://metacpan.org/changes/distribution/Module-Signature Source: CCN Type: oss-sec Mailing List, Thu, 19 Jan 2012 13:12:10 +0100 CVE request: Module::Signature before 0.75 - multiple vulnerabilities Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-3406 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |