Lucene search

K
cveRedhatCVE-2010-2059
HistoryJun 08, 2010 - 6:30 p.m.

CVE-2010-2059

2010-06-0818:30:10
CWE-264
redhat
web.nvd.nist.gov
37
nvd
cve-2010-2059
rpm
lib/fsm.c
file replacement
privilege escalation
local users
executable file
metadata
setuid
setgid
vulnerability

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.4

Confidence

High

EPSS

0

Percentile

10.1%

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

Affected configurations

Nvd
Node
rpmrpmRange4.4.2.3
OR
rpmrpmMatch1.2
OR
rpmrpmMatch1.3
OR
rpmrpmMatch1.3.1
OR
rpmrpmMatch1.4
OR
rpmrpmMatch1.4.2
OR
rpmrpmMatch1.4.2\/a
OR
rpmrpmMatch1.4.3
OR
rpmrpmMatch1.4.4
OR
rpmrpmMatch1.4.5
OR
rpmrpmMatch1.4.6
OR
rpmrpmMatch1.4.7
OR
rpmrpmMatch2..4.10
OR
rpmrpmMatch2.0
OR
rpmrpmMatch2.0.1
OR
rpmrpmMatch2.0.2
OR
rpmrpmMatch2.0.3
OR
rpmrpmMatch2.0.4
OR
rpmrpmMatch2.0.5
OR
rpmrpmMatch2.0.6
OR
rpmrpmMatch2.0.7
OR
rpmrpmMatch2.0.8
OR
rpmrpmMatch2.0.9
OR
rpmrpmMatch2.0.10
OR
rpmrpmMatch2.0.11
OR
rpmrpmMatch2.1
OR
rpmrpmMatch2.1.1
OR
rpmrpmMatch2.1.2
OR
rpmrpmMatch2.2
OR
rpmrpmMatch2.2.1
OR
rpmrpmMatch2.2.2
OR
rpmrpmMatch2.2.3
OR
rpmrpmMatch2.2.3.10
OR
rpmrpmMatch2.2.3.11
OR
rpmrpmMatch2.2.4
OR
rpmrpmMatch2.2.5
OR
rpmrpmMatch2.2.6
OR
rpmrpmMatch2.2.7
OR
rpmrpmMatch2.2.8
OR
rpmrpmMatch2.2.9
OR
rpmrpmMatch2.2.10
OR
rpmrpmMatch2.2.11
OR
rpmrpmMatch2.3
OR
rpmrpmMatch2.3.1
OR
rpmrpmMatch2.3.2
OR
rpmrpmMatch2.3.3
OR
rpmrpmMatch2.3.4
OR
rpmrpmMatch2.3.5
OR
rpmrpmMatch2.3.6
OR
rpmrpmMatch2.3.7
OR
rpmrpmMatch2.3.8
OR
rpmrpmMatch2.3.9
OR
rpmrpmMatch2.4.1
OR
rpmrpmMatch2.4.2
OR
rpmrpmMatch2.4.3
OR
rpmrpmMatch2.4.4
OR
rpmrpmMatch2.4.5
OR
rpmrpmMatch2.4.6
OR
rpmrpmMatch2.4.8
OR
rpmrpmMatch2.4.9
OR
rpmrpmMatch2.4.11
OR
rpmrpmMatch2.4.12
OR
rpmrpmMatch2.5
OR
rpmrpmMatch2.5.1
OR
rpmrpmMatch2.5.2
OR
rpmrpmMatch2.5.3
OR
rpmrpmMatch2.5.4
OR
rpmrpmMatch2.5.5
OR
rpmrpmMatch2.5.6
OR
rpmrpmMatch2.6.7
OR
rpmrpmMatch3.0
OR
rpmrpmMatch3.0.1
OR
rpmrpmMatch3.0.2
OR
rpmrpmMatch3.0.3
OR
rpmrpmMatch3.0.4
OR
rpmrpmMatch3.0.5
OR
rpmrpmMatch3.0.6
OR
rpmrpmMatch4.0.
OR
rpmrpmMatch4.0.1
OR
rpmrpmMatch4.0.2
OR
rpmrpmMatch4.0.3
OR
rpmrpmMatch4.0.4
OR
rpmrpmMatch4.1
OR
rpmrpmMatch4.3.3
OR
rpmrpmMatch4.4.2
OR
rpmrpmMatch4.4.2.1
OR
rpmrpmMatch4.4.2.2
Node
rpmrpmMatch4.6.0
OR
rpmrpmMatch4.6.1
OR
rpmrpmMatch4.7.0
OR
rpmrpmMatch4.7.1
OR
rpmrpmMatch4.7.2
OR
rpmrpmMatch4.8.0
VendorProductVersionCPE
rpmrpm*cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
rpmrpm1.2cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*
rpmrpm1.3cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*
rpmrpm1.3.1cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*
rpmrpm1.4cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*
rpmrpm1.4.2cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*
rpmrpm1.4.2/acpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:*
rpmrpm1.4.3cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*
rpmrpm1.4.4cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*
rpmrpm1.4.5cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 931

References

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.4

Confidence

High

EPSS

0

Percentile

10.1%