Lucene search

K
cveRedhatCVE-2013-6435
HistoryDec 16, 2014 - 6:59 p.m.

CVE-2013-6435

2014-12-1618:59:00
CWE-74
redhat
web.nvd.nist.gov
126
cve-2013-6435
rpm
race condition
remote code execution
nvd
vulnerability

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

AI Score

7.6

Confidence

High

EPSS

0.091

Percentile

94.7%

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

Affected configurations

Nvd
Node
rpmrpmRange4.11.1
OR
rpmrpmMatch1.2
OR
rpmrpmMatch1.3
OR
rpmrpmMatch1.3.1
OR
rpmrpmMatch1.4
OR
rpmrpmMatch1.4.1
OR
rpmrpmMatch1.4.2
OR
rpmrpmMatch1.4.2\/a
OR
rpmrpmMatch1.4.3
OR
rpmrpmMatch1.4.4
OR
rpmrpmMatch1.4.5
OR
rpmrpmMatch1.4.6
OR
rpmrpmMatch1.4.7
OR
rpmrpmMatch2.0
OR
rpmrpmMatch2.0.1
OR
rpmrpmMatch2.0.2
OR
rpmrpmMatch2.0.3
OR
rpmrpmMatch2.0.4
OR
rpmrpmMatch2.0.5
OR
rpmrpmMatch2.0.6
OR
rpmrpmMatch2.0.7
OR
rpmrpmMatch2.0.8
OR
rpmrpmMatch2.0.9
OR
rpmrpmMatch2.0.10
OR
rpmrpmMatch2.0.11
OR
rpmrpmMatch2.1
OR
rpmrpmMatch2.1.1
OR
rpmrpmMatch2.1.2
OR
rpmrpmMatch2.2
OR
rpmrpmMatch2.2.1
OR
rpmrpmMatch2.2.2
OR
rpmrpmMatch2.2.3
OR
rpmrpmMatch2.2.3.10
OR
rpmrpmMatch2.2.3.11
OR
rpmrpmMatch2.2.4
OR
rpmrpmMatch2.2.5
OR
rpmrpmMatch2.2.6
OR
rpmrpmMatch2.2.7
OR
rpmrpmMatch2.2.8
OR
rpmrpmMatch2.2.9
OR
rpmrpmMatch2.2.10
OR
rpmrpmMatch2.2.11
OR
rpmrpmMatch2.3
OR
rpmrpmMatch2.3.1
OR
rpmrpmMatch2.3.2
OR
rpmrpmMatch2.3.3
OR
rpmrpmMatch2.3.4
OR
rpmrpmMatch2.3.5
OR
rpmrpmMatch2.3.6
OR
rpmrpmMatch2.3.7
OR
rpmrpmMatch2.3.8
OR
rpmrpmMatch2.3.9
OR
rpmrpmMatch2.4.1
OR
rpmrpmMatch2.4.2
OR
rpmrpmMatch2.4.3
OR
rpmrpmMatch2.4.4
OR
rpmrpmMatch2.4.5
OR
rpmrpmMatch2.4.6
OR
rpmrpmMatch2.4.8
OR
rpmrpmMatch2.4.9
OR
rpmrpmMatch2.4.11
OR
rpmrpmMatch2.4.12
OR
rpmrpmMatch2.5
OR
rpmrpmMatch2.5.1
OR
rpmrpmMatch2.5.2
OR
rpmrpmMatch2.5.3
OR
rpmrpmMatch2.5.4
OR
rpmrpmMatch2.5.5
OR
rpmrpmMatch2.5.6
OR
rpmrpmMatch2.6.7
OR
rpmrpmMatch3.0
OR
rpmrpmMatch3.0.1
OR
rpmrpmMatch3.0.2
OR
rpmrpmMatch3.0.3
OR
rpmrpmMatch3.0.4
OR
rpmrpmMatch3.0.5
OR
rpmrpmMatch3.0.6
OR
rpmrpmMatch4.0.
OR
rpmrpmMatch4.0.1
OR
rpmrpmMatch4.0.2
OR
rpmrpmMatch4.0.3
OR
rpmrpmMatch4.0.4
OR
rpmrpmMatch4.1
OR
rpmrpmMatch4.3.3
OR
rpmrpmMatch4.4.2.1
OR
rpmrpmMatch4.4.2.2
OR
rpmrpmMatch4.4.2.3
OR
rpmrpmMatch4.5.90
OR
rpmrpmMatch4.6.0
OR
rpmrpmMatch4.6.0rc1
OR
rpmrpmMatch4.6.0rc2
OR
rpmrpmMatch4.6.0rc3
OR
rpmrpmMatch4.6.0rc4
OR
rpmrpmMatch4.6.1
OR
rpmrpmMatch4.7.0
OR
rpmrpmMatch4.7.1
OR
rpmrpmMatch4.7.2
OR
rpmrpmMatch4.8.0
OR
rpmrpmMatch4.8.1
OR
rpmrpmMatch4.9.0
OR
rpmrpmMatch4.9.0alpha
OR
rpmrpmMatch4.9.0beta1
OR
rpmrpmMatch4.9.0rc1
OR
rpmrpmMatch4.9.1
OR
rpmrpmMatch4.9.1.1
OR
rpmrpmMatch4.9.1.2
OR
rpmrpmMatch4.10.0
OR
rpmrpmMatch4.10.1
OR
rpmrpmMatch4.10.2
Node
debiandebian_linuxMatch7.0
VendorProductVersionCPE
rpmrpm*cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
rpmrpm1.2cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*
rpmrpm1.3cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*
rpmrpm1.3.1cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*
rpmrpm1.4cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*
rpmrpm1.4.1cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*
rpmrpm1.4.2cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*
rpmrpm1.4.2/acpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:*
rpmrpm1.4.3cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*
rpmrpm1.4.4cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 1101

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

AI Score

7.6

Confidence

High

EPSS

0.091

Percentile

94.7%