Vulnerability CVE-2014-0022


Published: 2014-01-26

Description:
The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
YUM cron insecure install of rpm packages
Vincent Danen
24.01.2014

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Baseurl -> YUM 

 References:
http://yum.baseurl.org/gitweb?p=yum.git;a=commitdiff;h=9df69e5794
https://bugzilla.redhat.com/show_bug.cgi?id=1057377
https://bugzilla.redhat.com/show_bug.cgi?id=1052440
http://www.securityfocus.com/bid/65119
http://secunia.com/advisories/56637

Copyright 2024, cxsecurity.com

 

Back to Top