CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
10.1%
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
Vendor | Product | Version | CPE |
---|---|---|---|
rpm | rpm | * | cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:* |
rpm | rpm | 1.2 | cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:* |
rpm | rpm | 1.3 | cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:* |
rpm | rpm | 1.3.1 | cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:* |
rpm | rpm | 1.4 | cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:* |
rpm | rpm | 1.4.2 | cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:* |
rpm | rpm | 1.4.2/a | cpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:* |
rpm | rpm | 1.4.3 | cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:* |
rpm | rpm | 1.4.4 | cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:* |
rpm | rpm | 1.4.5 | cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:* |
distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz
lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
lists.vmware.com/pipermail/security-announce/2011/000126.html
marc.info/?l=oss-security&m=127559059928131&w=2
rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383
secunia.com/advisories/40028
www.mandriva.com/security/advisories?name=MDVSA-2010:180
www.openwall.com/lists/oss-security/2010/06/02/2
www.openwall.com/lists/oss-security/2010/06/02/3
www.openwall.com/lists/oss-security/2010/06/03/5
www.openwall.com/lists/oss-security/2010/06/04/1
www.osvdb.org/65143
www.redhat.com/support/errata/RHSA-2010-0679.html
www.securityfocus.com/archive/1/516909/100/0/threaded
www.vmware.com/security/advisories/VMSA-2011-0004.html
www.vupen.com/english/advisories/2011/0606
bugzilla.redhat.com/show_bug.cgi?id=125517
bugzilla.redhat.com/show_bug.cgi?id=598775