Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7500

Опубликовано: 03 июл. 2017
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rpmWill not fix
Red Hat Enterprise Linux 6rpmWill not fix
Red Hat Enterprise Linux 7rpmWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1450369rpm: Following symlinks to directories when installing packages allows privilege escalation

EPSS

Процентиль: 17%
0.00054
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
nvd
больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
debian
больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a ...

suse-cvrf
больше 7 лет назад

Security update for rpm

suse-cvrf
больше 7 лет назад

Security update for rpm

EPSS

Процентиль: 17%
0.00054
Низкий

7.3 High

CVSS3