CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
94.7%
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
Vendor | Product | Version | CPE |
---|---|---|---|
rpm | rpm | * | cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:* |
rpm | rpm | 1.2 | cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:* |
rpm | rpm | 1.3 | cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:* |
rpm | rpm | 1.3.1 | cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:* |
rpm | rpm | 1.4 | cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:* |
rpm | rpm | 1.4.1 | cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:* |
rpm | rpm | 1.4.2 | cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:* |
rpm | rpm | 1.4.2/a | cpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:* |
rpm | rpm | 1.4.3 | cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:* |
rpm | rpm | 1.4.4 | cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:* |
advisories.mageia.org/MGASA-2014-0529.html
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
rhn.redhat.com/errata/RHSA-2014-1974.html
rhn.redhat.com/errata/RHSA-2014-1975.html
rhn.redhat.com/errata/RHSA-2014-1976.html
www.debian.org/security/2015/dsa-3129
www.mandriva.com/security/advisories?name=MDVSA-2014:251
www.mandriva.com/security/advisories?name=MDVSA-2015:056
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/71558
bugzilla.redhat.com/show_bug.cgi?id=1039811
security.gentoo.org/glsa/201811-22
securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/