Vulnerability CVE-2013-6435


Published: 2014-12-16

Description:
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

Type:

CWE-74

CVSS2 => (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.6/10
10/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
RPM -> RPM 
Debian -> Debian linux 

 References:
http://advisories.mageia.org/MGASA-2014-0529.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://rhn.redhat.com/errata/RHSA-2014-1974.html
http://rhn.redhat.com/errata/RHSA-2014-1975.html
http://rhn.redhat.com/errata/RHSA-2014-1976.html
http://www.debian.org/security/2015/dsa-3129
http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/71558
https://bugzilla.redhat.com/show_bug.cgi?id=1039811
https://security.gentoo.org/glsa/201811-22
https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/

Copyright 2024, cxsecurity.com

 

Back to Top