First published: Tue May 19 2015(Updated: )
Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cookie-signature | <=0.73 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3408 has a high severity due to its potential for remote code execution.
To fix CVE-2015-3408, upgrade Module::Signature to version 0.74 or later.
CVE-2015-3408 affects versions of Module::Signature prior to 0.74 and specific versions of Ubuntu Linux.
Yes, CVE-2015-3408 can be exploited remotely through a crafted SIGNATURE file.
CVE-2015-3408 can allow attackers to execute arbitrary shell commands, compromising the affected system's security.