Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://ubuntu.com/usn/usn-2607-1 - | |
References | () http://www.debian.org/security/2015/dsa-3261 - | |
References | () http://www.openwall.com/lists/oss-security/2015/04/07/1 - | |
References | () http://www.openwall.com/lists/oss-security/2015/04/23/17 - | |
References | () http://www.securityfocus.com/bid/73937 - | |
References | () https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef - | |
References | () https://metacpan.org/changes/distribution/Module-Signature - |
Information
Published : 2015-05-19 18:59
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3409
Mitre link : CVE-2015-3409
CVE.ORG link : CVE-2015-3409
JSON object : View
Products Affected
module-signature_project
- module-signature
canonical
- ubuntu_linux
CWE