Description
Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
References (7)
Core 7
Core References
Various Sources x_refsource_confirm
https://metacpan.org/changes/distribution/Module-Signature
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3261
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/04/07/1
Patch x_refsource_confirm
https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/04/23/17
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73937
Various Sources vendor-advisory
x_refsource_ubuntu
http://ubuntu.com/usn/usn-2607-1
Scores
EPSS
0.0006
EPSS Percentile
17.7%
Details
Status
published
Products (5)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
14.10
canonical/ubuntu_linux
15.04
module-signature_project/module-signature
< 0.74
Published
May 19, 2015
Tracked Since
Feb 18, 2026