Lucene search

K
nvd[email protected]NVD:CVE-2014-8118
HistoryDec 16, 2014 - 6:59 p.m.

CVE-2014-8118

2014-12-1618:59:06
CWE-189
web.nvd.nist.gov
7

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.368

Percentile

97.2%

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

Affected configurations

Nvd
Node
rpmrpmRange4.12.0
OR
rpmrpmMatch1.2
OR
rpmrpmMatch1.3
OR
rpmrpmMatch1.3.1
OR
rpmrpmMatch1.4
OR
rpmrpmMatch1.4.1
OR
rpmrpmMatch1.4.2
OR
rpmrpmMatch1.4.2\/a
OR
rpmrpmMatch1.4.3
OR
rpmrpmMatch1.4.4
OR
rpmrpmMatch1.4.5
OR
rpmrpmMatch1.4.6
OR
rpmrpmMatch1.4.7
OR
rpmrpmMatch2.0
OR
rpmrpmMatch2.0.1
OR
rpmrpmMatch2.0.2
OR
rpmrpmMatch2.0.3
OR
rpmrpmMatch2.0.4
OR
rpmrpmMatch2.0.5
OR
rpmrpmMatch2.0.6
OR
rpmrpmMatch2.0.7
OR
rpmrpmMatch2.0.8
OR
rpmrpmMatch2.0.9
OR
rpmrpmMatch2.0.10
OR
rpmrpmMatch2.0.11
OR
rpmrpmMatch2.1
OR
rpmrpmMatch2.1.1
OR
rpmrpmMatch2.1.2
OR
rpmrpmMatch2.2
OR
rpmrpmMatch2.2.1
OR
rpmrpmMatch2.2.2
OR
rpmrpmMatch2.2.3
OR
rpmrpmMatch2.2.3.10
OR
rpmrpmMatch2.2.3.11
OR
rpmrpmMatch2.2.4
OR
rpmrpmMatch2.2.5
OR
rpmrpmMatch2.2.6
OR
rpmrpmMatch2.2.7
OR
rpmrpmMatch2.2.8
OR
rpmrpmMatch2.2.9
OR
rpmrpmMatch2.2.10
OR
rpmrpmMatch2.2.11
OR
rpmrpmMatch2.3
OR
rpmrpmMatch2.3.1
OR
rpmrpmMatch2.3.2
OR
rpmrpmMatch2.3.3
OR
rpmrpmMatch2.3.4
OR
rpmrpmMatch2.3.5
OR
rpmrpmMatch2.3.6
OR
rpmrpmMatch2.3.7
OR
rpmrpmMatch2.3.8
OR
rpmrpmMatch2.3.9
OR
rpmrpmMatch2.4.1
OR
rpmrpmMatch2.4.2
OR
rpmrpmMatch2.4.3
OR
rpmrpmMatch2.4.4
OR
rpmrpmMatch2.4.5
OR
rpmrpmMatch2.4.6
OR
rpmrpmMatch2.4.8
OR
rpmrpmMatch2.4.9
OR
rpmrpmMatch2.4.11
OR
rpmrpmMatch2.4.12
OR
rpmrpmMatch2.5
OR
rpmrpmMatch2.5.1
OR
rpmrpmMatch2.5.2
OR
rpmrpmMatch2.5.3
OR
rpmrpmMatch2.5.4
OR
rpmrpmMatch2.5.5
OR
rpmrpmMatch2.5.6
OR
rpmrpmMatch2.6.7
OR
rpmrpmMatch3.0
OR
rpmrpmMatch3.0.1
OR
rpmrpmMatch3.0.2
OR
rpmrpmMatch3.0.3
OR
rpmrpmMatch3.0.4
OR
rpmrpmMatch3.0.5
OR
rpmrpmMatch3.0.6
OR
rpmrpmMatch4.0.
OR
rpmrpmMatch4.0.1
OR
rpmrpmMatch4.0.2
OR
rpmrpmMatch4.0.3
OR
rpmrpmMatch4.0.4
OR
rpmrpmMatch4.1
OR
rpmrpmMatch4.3.3
OR
rpmrpmMatch4.4.2.1
OR
rpmrpmMatch4.4.2.2
OR
rpmrpmMatch4.4.2.3
OR
rpmrpmMatch4.5.90
OR
rpmrpmMatch4.6.0
OR
rpmrpmMatch4.6.0rc1
OR
rpmrpmMatch4.6.0rc2
OR
rpmrpmMatch4.6.0rc3
OR
rpmrpmMatch4.6.0rc4
OR
rpmrpmMatch4.6.1
OR
rpmrpmMatch4.7.0
OR
rpmrpmMatch4.7.1
OR
rpmrpmMatch4.7.2
OR
rpmrpmMatch4.8.0
OR
rpmrpmMatch4.8.1
OR
rpmrpmMatch4.9.0
OR
rpmrpmMatch4.9.0alpha
OR
rpmrpmMatch4.9.0beta1
OR
rpmrpmMatch4.9.0rc1
OR
rpmrpmMatch4.9.1
OR
rpmrpmMatch4.9.1.1
OR
rpmrpmMatch4.9.1.2
OR
rpmrpmMatch4.10.0
OR
rpmrpmMatch4.10.1
OR
rpmrpmMatch4.10.2
VendorProductVersionCPE
rpmrpm*cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
rpmrpm1.2cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*
rpmrpm1.3cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*
rpmrpm1.3.1cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*
rpmrpm1.4cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*
rpmrpm1.4.1cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*
rpmrpm1.4.2cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*
rpmrpm1.4.2/acpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:*
rpmrpm1.4.3cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*
rpmrpm1.4.4cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 1091

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.368

Percentile

97.2%