Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0022

Опубликовано: 13 янв. 2014
Источник: redhat
CVSS2: 7.6
EPSS Низкий

Описание

The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.

It was discovered that yum-updatesd did not properly perform RPM package signature checks. When yum-updatesd was configured to automatically install updates, a remote attacker could use this flaw to install a malicious update on the target system using an unsigned RPM or an RPM signed with an untrusted key.

Отчет

This issue did not affect the versions of yum as shipped with Red Hat Enterprise Linux 6 and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6yumNot affected
Red Hat Enterprise Linux 7yumNot affected
Red Hat Enterprise Linux 5yum-updatesdFixedRHSA-2014:100405.08.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-252->CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=1057377yum: yum-cron installs unsigned packages

EPSS

Процентиль: 67%
0.00551
Низкий

7.6 High

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.

nvd
больше 11 лет назад

The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.

github
больше 3 лет назад

The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.

oracle-oval
около 11 лет назад

ELSA-2014-1004: yum-updatesd security update (IMPORTANT)

fstec
около 11 лет назад

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить целостность защищаемой информации

EPSS

Процентиль: 67%
0.00551
Низкий

7.6 High

CVSS2