Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6435

Опубликовано: 09 дек. 2014
Источник: redhat
CVSS2: 7.6

Описание

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6rpmAffected
Red Hat Enterprise Linux 5rpmFixedRHSA-2014:197409.12.2014
Red Hat Enterprise Linux 5.6 Long LiferpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6rpmFixedRHSA-2014:197409.12.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 7rpmFixedRHSA-2014:197609.12.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=1039811rpm: race condition during the installation process

7.6 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

nvd
больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

debian
больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to ex ...

github
больше 3 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

oracle-oval
больше 10 лет назад

ELSA-2014-1974: rpm security update (IMPORTANT)

7.6 High

CVSS2