{"id":"UBUNTU-CVE-2015-3408","details":"Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.","modified":"2026-02-04T02:37:16.064308Z","published":"2015-04-23T00:00:00Z","related":["USN-2607-1"],"upstream":["CVE-2015-3408"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3408"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2015/04/07/1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2607-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-3408"}],"affected":[{"package":{"name":"libmodule-signature-perl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libmodule-signature-perl@0.73-1ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.73-1ubuntu0.14.04.1"}]}],"versions":["0.73-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmodule-signature-perl","binary_version":"0.73-1ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3408.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}