Bug 828010 (CVE-2013-2145) - VUL-0: CVE-2013-2145: perl-Module-Signature: arbitrary code execution when verifying SIGNATURE
Summary: VUL-0: CVE-2013-2145: perl-Module-Signature: arbitrary code execution when ve...
Status: RESOLVED FIXED
Alias: CVE-2013-2145
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 12.3
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-07-03 15:42 UTC by Marcus Meissner
Modified: 2014-07-02 11:28 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2013-07-03 15:42:55 UTC
is public, via RH Bugzilla

https://bugzilla.redhat.com/show_bug.cgi?id=971096

The perl Module::Signature module adds signing capabilities to CPAN modules.  The 'cpansign verify' command will automatically download keys and use them to check the signature of CPAN packages via the SIGNATURE file.

The format of the SIGNATURE file includes the cipher to use to match the provided hash; for instance:

SHA1 955ba924e9cd1bafccb4d6d7bd3be25c3ce8bf75 README

If an attacker were to replace this (SHA1) with a special unknown cipher (e.g. 'Special') and were to include in the distribution a 'Digest/Special.pm', the code in this perl module would be executed when 'cpansign -verify' is run.  This will execute arbitrary code with the privileges of the user running cpansign.

Because cpansign will download public keys from a public key repository, the GPG key used to sign the SIGNATURE file may also be suspect; an attacker able to modify a CPAN module distribution file and sign the SIGNATURE file with their own key only has to make their key public.  cpansign will download the attacker's key, validate the SIGNATURE file as being correctly signed, but will then execute code as noted above, if the SIGNATURE file is crafted in this way.

Module::Signature version 0.72 corrects [1],[2] this issue by refusing to load Digest::* modules from relative paths in @INC.

[1] https://github.com/audreyt/module-signature/commit/575f7bd6ba4cc7c92f841e8758f88a131674ebf2
[2] https://github.com/audreyt/module-signature/commit/cbd06b392a73c63159dc5c20ff5b3c8fc88c4896


Acknowledgements:

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Comment 1 Marcus Meissner 2013-07-03 15:44:12 UTC
(openSUSE only, updates were done by either coolo or Chris ... please someone take care)
Comment 2 Christian Wittmer 2013-07-03 19:03:56 UTC
ongoing work
Comment 3 Christian Wittmer 2013-07-03 19:42:09 UTC
update to 0.73, fix for bnc#828010 (CVE-2013-2145)

Maintenance Request for 12.2/12.3 created
Comment 4 Bernhard Wiedemann 2013-07-03 20:00:25 UTC
This is an autogenerated message for OBS integration:
This bug (828010) was mentioned in
https://build.opensuse.org/request/show/181932 Maintenance /
Comment 5 Bernhard Wiedemann 2013-07-03 21:00:08 UTC
This is an autogenerated message for OBS integration:
This bug (828010) was mentioned in
https://build.opensuse.org/request/show/181934 Factory / perl-Module-Signature
Comment 6 Swamp Workflow Management 2013-07-03 22:00:39 UTC
bugbot adjusting priority
Comment 7 Marcus Meissner 2013-07-04 06:06:39 UTC
accepted
Comment 8 Swamp Workflow Management 2013-07-11 06:04:21 UTC
openSUSE-SU-2013:1178-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 828010
CVE References: CVE-2013-2145
Sources used:
openSUSE 12.3 (src):    perl-Module-Signature-0.73-4.4.1
openSUSE 12.2 (src):    perl-Module-Signature-0.73-2.4.1
Comment 9 Marcus Meissner 2013-07-11 06:35:18 UTC
released
Comment 10 Bernhard Wiedemann 2013-07-11 09:00:49 UTC
This is an autogenerated message for OBS integration:
This bug (828010) was mentioned in
https://build.opensuse.org/request/show/182799 Maintenance /
Comment 11 Swamp Workflow Management 2013-07-12 07:04:23 UTC
openSUSE-SU-2013:1185-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 828010
CVE References: CVE-2013-2145
Sources used:
openSUSE 11.4 (src):    perl-Module-Signature-0.73-9.1
Comment 12 Bernhard Wiedemann 2013-08-04 16:00:22 UTC
This is an autogenerated message for OBS integration:
This bug (828010) was mentioned in
https://build.opensuse.org/request/show/185844 Factory / perl-Module-Signature