Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3445
HistoryMay 19, 2021 - 12:00 a.m.

CVE-2021-3445

2021-05-1900:00:00
ubuntu.com
ubuntu.com
19
libdnf
code execution
altered rpm package
signature verification
vulnerability
confidentiality
integrity
system availability

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.7%

A flaw was found in libdnf’s signature verification functionality in
versions before 0.60.1. This flaw allows an attacker to achieve code
execution if they can alter the header information of an RPM package and
then trick a user or system into installing it. The highest risk of this
vulnerability is to confidentiality, integrity, as well as system
availability.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchlibdnf< anyUNKNOWN
ubuntu24.04noarchlibdnf< anyUNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.7%