Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6435

Опубликовано: 09 дек. 2014
Источник: redhat
CVSS2: 7.6
EPSS Низкий

Описание

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6rpmAffected
Red Hat Enterprise Linux 5rpmFixedRHSA-2014:197409.12.2014
Red Hat Enterprise Linux 5.6 Long LiferpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6rpmFixedRHSA-2014:197409.12.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportrpmFixedRHSA-2014:197509.12.2014
Red Hat Enterprise Linux 7rpmFixedRHSA-2014:197609.12.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=1039811rpm: race condition during the installation process

EPSS

Процентиль: 89%
0.05085
Низкий

7.6 High

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

nvd
почти 11 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

debian
почти 11 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to ex ...

github
больше 3 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

oracle-oval
почти 11 лет назад

ELSA-2014-1974: rpm security update (IMPORTANT)

EPSS

Процентиль: 89%
0.05085
Низкий

7.6 High

CVSS2