Логотип exploitDog
bind:CVE-2017-7500
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-7500

Количество 11

Количество 11

ubuntu логотип

CVE-2017-7500

больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
EPSS: Низкий
redhat логотип

CVE-2017-7500

больше 8 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2017-7500

больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2017-7500

больше 7 лет назад

It was found that rpm did not properly handle RPM installations when a ...

CVSS3: 7.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2215-1

больше 7 лет назад

Security update for rpm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2073-1

больше 7 лет назад

Security update for rpm

EPSS: Низкий
github логотип

GHSA-2jc3-8rq8-7x2x

больше 3 лет назад

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:3373-1

больше 7 лет назад

Security update for rpm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3884-2

почти 7 лет назад

Security update for rpm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3884-1

около 7 лет назад

Security update for rpm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3286-1

больше 7 лет назад

Security update for rpm

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-7500

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2017-7500

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-7500

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.3
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-7500

It was found that rpm did not properly handle RPM installations when a ...

CVSS3: 7.3
0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2215-1

Security update for rpm

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2073-1

Security update for rpm

0%
Низкий
больше 7 лет назад
github логотип
GHSA-2jc3-8rq8-7x2x

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2018:3373-1

Security update for rpm

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3884-2

Security update for rpm

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3884-1

Security update for rpm

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3286-1

Security update for rpm

больше 7 лет назад

Уязвимостей на страницу