First published: Fri Nov 29 2019(Updated: )
The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to cause the unsigned portion of a SIGNATURE file to be treated as the signed portion via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cookie-signature | <0.74 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3406 is classified as a medium severity vulnerability.
To fix CVE-2015-3406, upgrade Module::Signature to version 0.74 or later.
CVE-2015-3406 affects Module::Signature versions earlier than 0.74 and various Ubuntu Linux distributions.
Yes, CVE-2015-3406 can be exploited by remote attackers due to improper PGP signature handling.
Exploitation of CVE-2015-3406 can lead to the unsigned portion of a SIGNATURE file being mistaken for the signed portion.