First published: Tue May 19 2015(Updated: )
Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
module-signature | <=0.74 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3409 is considered a local privilege escalation vulnerability.
To fix CVE-2015-3409, upgrade Module::Signature to version 0.75 or later.
Local users on systems with Module::Signature versions prior to 0.75 are affected by CVE-2015-3409.
CVE-2015-3409 is an untrusted search path vulnerability.
No, CVE-2015-3409 requires local access to the system to be exploited.