7.6

CVE-2013-6435

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RpmRpm Version <= 4.11.1
RpmRpm Version1.2
RpmRpm Version1.3
RpmRpm Version1.3.1
RpmRpm Version1.4
RpmRpm Version1.4.1
RpmRpm Version1.4.2
RpmRpm Version1.4.3
RpmRpm Version1.4.4
RpmRpm Version1.4.5
RpmRpm Version1.4.6
RpmRpm Version1.4.7
RpmRpm Version2.0
RpmRpm Version2.0.1
RpmRpm Version2.0.2
RpmRpm Version2.0.3
RpmRpm Version2.0.4
RpmRpm Version2.0.5
RpmRpm Version2.0.6
RpmRpm Version2.0.7
RpmRpm Version2.0.8
RpmRpm Version2.0.9
RpmRpm Version2.0.10
RpmRpm Version2.0.11
RpmRpm Version2.1
RpmRpm Version2.1.1
RpmRpm Version2.1.2
RpmRpm Version2.2
RpmRpm Version2.2.1
RpmRpm Version2.2.2
RpmRpm Version2.2.3
RpmRpm Version2.2.3.10
RpmRpm Version2.2.3.11
RpmRpm Version2.2.4
RpmRpm Version2.2.5
RpmRpm Version2.2.6
RpmRpm Version2.2.7
RpmRpm Version2.2.8
RpmRpm Version2.2.9
RpmRpm Version2.2.10
RpmRpm Version2.2.11
RpmRpm Version2.3
RpmRpm Version2.3.1
RpmRpm Version2.3.2
RpmRpm Version2.3.3
RpmRpm Version2.3.4
RpmRpm Version2.3.5
RpmRpm Version2.3.6
RpmRpm Version2.3.7
RpmRpm Version2.3.8
RpmRpm Version2.3.9
RpmRpm Version2.4.1
RpmRpm Version2.4.2
RpmRpm Version2.4.3
RpmRpm Version2.4.4
RpmRpm Version2.4.5
RpmRpm Version2.4.6
RpmRpm Version2.4.8
RpmRpm Version2.4.9
RpmRpm Version2.4.11
RpmRpm Version2.4.12
RpmRpm Version2.5
RpmRpm Version2.5.1
RpmRpm Version2.5.2
RpmRpm Version2.5.3
RpmRpm Version2.5.4
RpmRpm Version2.5.5
RpmRpm Version2.5.6
RpmRpm Version2.6.7
RpmRpm Version3.0
RpmRpm Version3.0.1
RpmRpm Version3.0.2
RpmRpm Version3.0.3
RpmRpm Version3.0.4
RpmRpm Version3.0.5
RpmRpm Version3.0.6
RpmRpm Version4.0.
RpmRpm Version4.0.1
RpmRpm Version4.0.2
RpmRpm Version4.0.3
RpmRpm Version4.0.4
RpmRpm Version4.1
RpmRpm Version4.3.3
RpmRpm Version4.4.2.1
RpmRpm Version4.4.2.2
RpmRpm Version4.4.2.3
RpmRpm Version4.5.90
RpmRpm Version4.6.0
RpmRpm Version4.6.0 Updaterc1
RpmRpm Version4.6.0 Updaterc2
RpmRpm Version4.6.0 Updaterc3
RpmRpm Version4.6.0 Updaterc4
RpmRpm Version4.6.1
RpmRpm Version4.7.0
RpmRpm Version4.7.1
RpmRpm Version4.7.2
RpmRpm Version4.8.0
RpmRpm Version4.8.1
RpmRpm Version4.9.0
RpmRpm Version4.9.0 Updatealpha
RpmRpm Version4.9.0 Updatebeta1
RpmRpm Version4.9.0 Updaterc1
RpmRpm Version4.9.1
RpmRpm Version4.9.1.1
RpmRpm Version4.9.1.2
RpmRpm Version4.10.0
RpmRpm Version4.10.1
RpmRpm Version4.10.2
DebianDebian Linux Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.09% 0.894
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.6 4.9 10
AV:N/AC:H/Au:N/C:C/I:C/A:C
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.