8.8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.058 Low
EPSS
Percentile
93.2%
It was discovered that RPM incorrectly handled certain package headers. If
a user or automated system were tricked into installing a specially crafted
RPM package, an attacker could cause RPM to crash, resulting in a denial of
service, or possibly execute arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | rpm | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpm-dbg | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpm-dev | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpm2 | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpmbuild2 | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpmio2 | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | librpmsign0 | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | python-rpm | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | rpm-common | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | rpm2cpio | < 4.9.1.1-1ubuntu0.1 | UNKNOWN |