Lucene search

K
f5F5F5:K16383
HistorySep 11, 2015 - 12:00 a.m.

K16383 : Linux RPM vulnerability CVE-2013-6435

2015-09-1100:00:00
my.f5.com
11

7.6 High

AI Score

Confidence

High

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.067 Low

EPSS

Percentile

93.2%

Security Advisory Description

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory
. (
CVE-2013-6435
)
Impact
In normal BIG-IP operation, F5 does not support system administrators installing RPM packages. An attacker with local-only access can trigger this condition. The necessary steps to achieve this condition require that the user have system shell access and the ability to load files onto the BIG-IP system.

7.6 High

AI Score

Confidence

High

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.067 Low

EPSS

Percentile

93.2%