| Vulnerability Name: | CVE-2015-3408 (CCN-105078) | ||||||||||||||||||||||||||||
| Assigned: | 2015-04-06 | ||||||||||||||||||||||||||||
| Published: | 2015-04-06 | ||||||||||||||||||||||||||||
| Updated: | 2017-11-04 | ||||||||||||||||||||||||||||
| Summary: | Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest. | ||||||||||||||||||||||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-77 | ||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-3408 Source: UBUNTU Type: UNKNOWN USN-2607-1 Source: DEBIAN Type: UNKNOWN DSA-3261 Source: CCN Type: oss-security Mailing List, Mon, 06 Apr 2015 23:52:09 -0500 CVE request: Module::Signature before 0.75 - multiple vulnerabilities Source: MLIST Type: UNKNOWN [oss-security] 20150406 CVE request: Module::Signature before 0.75 - multiple vulnerabilities Source: MLIST Type: UNKNOWN [oss-security] 20150423 Re: CVE request: Module::Signature before 0.75 - multiple vulnerabilities Source: XF Type: UNKNOWN perl-signature-cve20153408-cmd-exec(105078) Source: CONFIRM Type: UNKNOWN https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f Source: CCN Type: metacpan Web site AUDREYT / Module-Signature-0.79 / Changes Source: CONFIRM Type: UNKNOWN https://metacpan.org/changes/distribution/Module-Signature Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-3408 | ||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||