Lucene search

K
nvd[email protected]NVD:CVE-2010-2059
HistoryJun 08, 2010 - 6:30 p.m.

CVE-2010-2059

2010-06-0818:30:10
CWE-264
web.nvd.nist.gov
1

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.3%

lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.

Affected configurations

NVD
Node
rpmrpmRange4.4.2.3
OR
rpmrpmMatch1.2
OR
rpmrpmMatch1.3
OR
rpmrpmMatch1.3.1
OR
rpmrpmMatch1.4
OR
rpmrpmMatch1.4.2
OR
rpmrpmMatch1.4.2\/a
OR
rpmrpmMatch1.4.3
OR
rpmrpmMatch1.4.4
OR
rpmrpmMatch1.4.5
OR
rpmrpmMatch1.4.6
OR
rpmrpmMatch1.4.7
OR
rpmrpmMatch2..4.10
OR
rpmrpmMatch2.0
OR
rpmrpmMatch2.0.1
OR
rpmrpmMatch2.0.2
OR
rpmrpmMatch2.0.3
OR
rpmrpmMatch2.0.4
OR
rpmrpmMatch2.0.5
OR
rpmrpmMatch2.0.6
OR
rpmrpmMatch2.0.7
OR
rpmrpmMatch2.0.8
OR
rpmrpmMatch2.0.9
OR
rpmrpmMatch2.0.10
OR
rpmrpmMatch2.0.11
OR
rpmrpmMatch2.1
OR
rpmrpmMatch2.1.1
OR
rpmrpmMatch2.1.2
OR
rpmrpmMatch2.2
OR
rpmrpmMatch2.2.1
OR
rpmrpmMatch2.2.2
OR
rpmrpmMatch2.2.3
OR
rpmrpmMatch2.2.3.10
OR
rpmrpmMatch2.2.3.11
OR
rpmrpmMatch2.2.4
OR
rpmrpmMatch2.2.5
OR
rpmrpmMatch2.2.6
OR
rpmrpmMatch2.2.7
OR
rpmrpmMatch2.2.8
OR
rpmrpmMatch2.2.9
OR
rpmrpmMatch2.2.10
OR
rpmrpmMatch2.2.11
OR
rpmrpmMatch2.3
OR
rpmrpmMatch2.3.1
OR
rpmrpmMatch2.3.2
OR
rpmrpmMatch2.3.3
OR
rpmrpmMatch2.3.4
OR
rpmrpmMatch2.3.5
OR
rpmrpmMatch2.3.6
OR
rpmrpmMatch2.3.7
OR
rpmrpmMatch2.3.8
OR
rpmrpmMatch2.3.9
OR
rpmrpmMatch2.4.1
OR
rpmrpmMatch2.4.2
OR
rpmrpmMatch2.4.3
OR
rpmrpmMatch2.4.4
OR
rpmrpmMatch2.4.5
OR
rpmrpmMatch2.4.6
OR
rpmrpmMatch2.4.8
OR
rpmrpmMatch2.4.9
OR
rpmrpmMatch2.4.11
OR
rpmrpmMatch2.4.12
OR
rpmrpmMatch2.5
OR
rpmrpmMatch2.5.1
OR
rpmrpmMatch2.5.2
OR
rpmrpmMatch2.5.3
OR
rpmrpmMatch2.5.4
OR
rpmrpmMatch2.5.5
OR
rpmrpmMatch2.5.6
OR
rpmrpmMatch2.6.7
OR
rpmrpmMatch3.0
OR
rpmrpmMatch3.0.1
OR
rpmrpmMatch3.0.2
OR
rpmrpmMatch3.0.3
OR
rpmrpmMatch3.0.4
OR
rpmrpmMatch3.0.5
OR
rpmrpmMatch3.0.6
OR
rpmrpmMatch4.0.
OR
rpmrpmMatch4.0.1
OR
rpmrpmMatch4.0.2
OR
rpmrpmMatch4.0.3
OR
rpmrpmMatch4.0.4
OR
rpmrpmMatch4.1
OR
rpmrpmMatch4.3.3
OR
rpmrpmMatch4.4.2
OR
rpmrpmMatch4.4.2.1
OR
rpmrpmMatch4.4.2.2
Node
rpmrpmMatch4.6.0
OR
rpmrpmMatch4.6.1
OR
rpmrpmMatch4.7.0
OR
rpmrpmMatch4.7.1
OR
rpmrpmMatch4.7.2
OR
rpmrpmMatch4.8.0

References

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.3%