Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-6435 (GCVE-0-2013-6435)
Vulnerability from cvelistv5 – Published: 2014-12-16 18:00 – Updated: 2024-08-06 17:39
VLAI?
EPSS
Summary
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:39:01.291Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "MDVSA-2015:056",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"name": "GLSA-201811-22",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
},
{
"name": "RHSA-2014:1975",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"name": "MDVSA-2014:251",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"name": "71558",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/71558"
},
{
"name": "RHSA-2014:1974",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-3129",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"name": "RHSA-2014:1976",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-11-29T10:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "MDVSA-2015:056",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"name": "GLSA-201811-22",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
},
{
"name": "RHSA-2014:1975",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"name": "MDVSA-2014:251",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"name": "71558",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/71558"
},
{
"name": "RHSA-2014:1974",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-3129",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"name": "RHSA-2014:1976",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-6435",
"datePublished": "2014-12-16T18:00:00.000Z",
"dateReserved": "2013-11-04T00:00:00.000Z",
"dateUpdated": "2024-08-06T17:39:01.291Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2013-6435
Vulnerability from fkie_nvd - Published: 2014-12-16 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://advisories.mageia.org/MGASA-2014-0529.html | ||
| secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1974.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1975.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1976.html | ||
| secalert@redhat.com | http://www.debian.org/security/2015/dsa-3129 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2014:251 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:056 | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/71558 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1039811 | ||
| secalert@redhat.com | https://security.gentoo.org/glsa/201811-22 | ||
| secalert@redhat.com | https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2014-0529.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1974.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1975.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1976.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3129 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:251 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:056 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/71558 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1039811 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201811-22 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/ |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rpm | rpm | * | |
| rpm | rpm | 1.2 | |
| rpm | rpm | 1.3 | |
| rpm | rpm | 1.3.1 | |
| rpm | rpm | 1.4 | |
| rpm | rpm | 1.4.1 | |
| rpm | rpm | 1.4.2 | |
| rpm | rpm | 1.4.2\/a | |
| rpm | rpm | 1.4.3 | |
| rpm | rpm | 1.4.4 | |
| rpm | rpm | 1.4.5 | |
| rpm | rpm | 1.4.6 | |
| rpm | rpm | 1.4.7 | |
| rpm | rpm | 2.0 | |
| rpm | rpm | 2.0.1 | |
| rpm | rpm | 2.0.2 | |
| rpm | rpm | 2.0.3 | |
| rpm | rpm | 2.0.4 | |
| rpm | rpm | 2.0.5 | |
| rpm | rpm | 2.0.6 | |
| rpm | rpm | 2.0.7 | |
| rpm | rpm | 2.0.8 | |
| rpm | rpm | 2.0.9 | |
| rpm | rpm | 2.0.10 | |
| rpm | rpm | 2.0.11 | |
| rpm | rpm | 2.1 | |
| rpm | rpm | 2.1.1 | |
| rpm | rpm | 2.1.2 | |
| rpm | rpm | 2.2 | |
| rpm | rpm | 2.2.1 | |
| rpm | rpm | 2.2.2 | |
| rpm | rpm | 2.2.3 | |
| rpm | rpm | 2.2.3.10 | |
| rpm | rpm | 2.2.3.11 | |
| rpm | rpm | 2.2.4 | |
| rpm | rpm | 2.2.5 | |
| rpm | rpm | 2.2.6 | |
| rpm | rpm | 2.2.7 | |
| rpm | rpm | 2.2.8 | |
| rpm | rpm | 2.2.9 | |
| rpm | rpm | 2.2.10 | |
| rpm | rpm | 2.2.11 | |
| rpm | rpm | 2.3 | |
| rpm | rpm | 2.3.1 | |
| rpm | rpm | 2.3.2 | |
| rpm | rpm | 2.3.3 | |
| rpm | rpm | 2.3.4 | |
| rpm | rpm | 2.3.5 | |
| rpm | rpm | 2.3.6 | |
| rpm | rpm | 2.3.7 | |
| rpm | rpm | 2.3.8 | |
| rpm | rpm | 2.3.9 | |
| rpm | rpm | 2.4.1 | |
| rpm | rpm | 2.4.2 | |
| rpm | rpm | 2.4.3 | |
| rpm | rpm | 2.4.4 | |
| rpm | rpm | 2.4.5 | |
| rpm | rpm | 2.4.6 | |
| rpm | rpm | 2.4.8 | |
| rpm | rpm | 2.4.9 | |
| rpm | rpm | 2.4.11 | |
| rpm | rpm | 2.4.12 | |
| rpm | rpm | 2.5 | |
| rpm | rpm | 2.5.1 | |
| rpm | rpm | 2.5.2 | |
| rpm | rpm | 2.5.3 | |
| rpm | rpm | 2.5.4 | |
| rpm | rpm | 2.5.5 | |
| rpm | rpm | 2.5.6 | |
| rpm | rpm | 2.6.7 | |
| rpm | rpm | 3.0 | |
| rpm | rpm | 3.0.1 | |
| rpm | rpm | 3.0.2 | |
| rpm | rpm | 3.0.3 | |
| rpm | rpm | 3.0.4 | |
| rpm | rpm | 3.0.5 | |
| rpm | rpm | 3.0.6 | |
| rpm | rpm | 4.0. | |
| rpm | rpm | 4.0.1 | |
| rpm | rpm | 4.0.2 | |
| rpm | rpm | 4.0.3 | |
| rpm | rpm | 4.0.4 | |
| rpm | rpm | 4.1 | |
| rpm | rpm | 4.3.3 | |
| rpm | rpm | 4.4.2.1 | |
| rpm | rpm | 4.4.2.2 | |
| rpm | rpm | 4.4.2.3 | |
| rpm | rpm | 4.5.90 | |
| rpm | rpm | 4.6.0 | |
| rpm | rpm | 4.6.0 | |
| rpm | rpm | 4.6.0 | |
| rpm | rpm | 4.6.0 | |
| rpm | rpm | 4.6.0 | |
| rpm | rpm | 4.6.1 | |
| rpm | rpm | 4.7.0 | |
| rpm | rpm | 4.7.1 | |
| rpm | rpm | 4.7.2 | |
| rpm | rpm | 4.8.0 | |
| rpm | rpm | 4.8.1 | |
| rpm | rpm | 4.9.0 | |
| rpm | rpm | 4.9.0 | |
| rpm | rpm | 4.9.0 | |
| rpm | rpm | 4.9.0 | |
| rpm | rpm | 4.9.1 | |
| rpm | rpm | 4.9.1.1 | |
| rpm | rpm | 4.9.1.2 | |
| rpm | rpm | 4.10.0 | |
| rpm | rpm | 4.10.1 | |
| rpm | rpm | 4.10.2 | |
| debian | debian_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA94CF0-0F15-43AE-A55F-CAD58625F138",
"versionEndIncluding": "4.11.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76112E07-F476-41E5-9FF8-E85C28019BD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E064D1B0-093D-4C62-89A0-481D261F9AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D05B2BC3-41EB-4839-B3DC-AF8B567D0318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "55B95097-EEA2-42A1-AA30-4AC519E67B1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "985E051C-677E-4DCD-9181-F5F33342FE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "267ACF41-E8E2-4F9E-983A-E526DACFCE82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.2\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "6429C42B-EBD6-4D93-AABB-AD268ADB72AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1372FF29-498C-41CB-AB2E-25CEC92866AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFE8428-E00F-4E5F-8787-F63FEE93E617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4E9CC7-1BD8-490B-9C9B-E4A76EFAD13D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BFAB0B1A-A9E5-4808-85EC-0BD2A3F753AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D1E892-05D5-4C79-AD12-7B7C0421E509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA6696D-D6CC-4C23-AB8F-91474BFC341E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B16D91A5-35F5-44F3-A515-8E4F27B563D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "08974D05-C00C-438C-A76F-E17C191D0CE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81771BF8-0788-44B5-8694-AFF436FDECD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93BF53E9-CC37-4E31-9F34-2B569947887F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D79478-665E-4D18-AAA6-BA51C41A4C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1A59FF59-BD73-4C13-AC51-98126ED46573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99C83F0D-159B-4CFB-92C6-83D36225080A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9B7A4BC0-43DF-4542-A54F-BF8B07F30B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B926B035-659A-4F86-B680-CD1A6163F2D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A98BC57C-69AD-40F6-885B-3A560F69809F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "71499D02-8989-4AA0-80FB-28860F103EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B424D987-8421-4FE5-B9F7-0D4AB7AC921B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9F58F12D-301C-4C4D-8F78-0B6A7B220B0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "19A30CF4-508D-407B-A097-30331AF9D452",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E49FB5B-5BFA-4736-8F2C-C07188D0BC00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "883AE5CC-379E-41A7-A8B5-12671015F131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D8FEA-89A2-4133-89D7-FD403D605E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDA2319-4C36-44A5-A1F2-E0F1EFC1DE23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E11322F8-93B7-457C-8993-B0A8D3274468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD35E28-313C-4CF7-AEC0-1C91316FF5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2B591779-643B-4E2E-9270-40748EDA1BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C91C9-CFDC-4C51-B6AF-51F1560161A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D67C30-F0CA-410B-8C3A-EA5536BC256E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "80DB9D55-9BC2-416C-9A2A-021F4EC0E884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7B48E845-573C-4F07-8D69-F1A54CCEEDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9642BA0F-CBBD-4FB5-8A20-BBCAD7EC31CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "45C9FE2D-197A-45EB-BE40-B746B13F2C02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E07E462F-2163-430B-9315-75BFD00113C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1F650FC0-1DF8-4432-92F5-4B4DCEFC2D39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "347BC012-5307-4B0F-A013-624ED455ABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED89DCC-0EFF-4665-BDE0-406155A46BDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9EEB6C44-B615-46F8-A5DC-BEF25D932314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "979D846B-9DD9-474A-A8BE-25334D2969B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF5DE17-2061-4896-B7DA-CFDEF46E9652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB528B71-8BF5-4D93-A1BC-DF0502AEA58F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0585DC0B-DFBB-466E-9D3D-86E19A4B88A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "041B087D-4FBC-4EDC-AAC0-DF8A1D39980A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4FB33B-5015-4620-BD21-3F0C916069EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "684E9118-30B2-476C-816E-CA4B2916017B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0AF46B23-559C-4DF0-8510-C79F17ABF22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BD40A202-557B-495C-BBE5-DEC9FF97EE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F3DB711-AE17-4B3B-9D45-C38CBDF418A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2E6A8E-4C9B-46A1-B786-6C0B3A3395F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3D049089-7FBD-41A6-8A5B-8497DA24C720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "20DEBEDF-3E64-4417-BC41-7F0E20C522F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF99B53-237E-468B-8B7F-A105FE40803B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5D5F196-4BA9-43EB-BE38-EE405C8CC0FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "66C4022C-F1D4-4A58-8341-E22EAF943511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5503DC6-40DB-4A84-984E-BDEED82F224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "90148D48-5DA5-46F9-AE96-618C427A5DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "733E1435-CE73-4A39-97EB-304D2F45A838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA80DA6E-CCE3-4CAF-B2A1-E6FF2B702D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D08FD930-F2BC-47BC-86BC-07545D1431B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "97DE028F-D0BE-435C-826D-CCBFFEBF3B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E08EB15D-1842-41F4-9F19-FF6571055242",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "43CF2BBF-83AA-451E-8E30-E040EFCF6F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "409B29B1-E2E0-4CBD-83D0-F4CE67820F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D325D4A-166A-4174-BEA8-1C6D47A8DDBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6AEBBD1-2320-42A3-8DCA-46DF61007349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E54C09F8-F0F5-4BDF-868F-0B6A4609B3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "132C1B54-0438-4239-B599-8160D494EE26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E5CCEAC-3D92-46DB-AC88-859ED5A5E277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ED68CE6A-2BF5-49F2-AEAE-199AAC94807B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*",
"matchCriteriaId": "5C589CD4-5A9E-41E1-BBFA-AF4BE2DD31E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "49E406BD-8CC3-4929-ABB2-F820F8C83823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8685704C-C43D-4315-A541-4E04B7B08B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "39C1D452-A003-4DB1-A8CF-0F7FBB9A5811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F8C79E-416F-4C88-B102-3BB60E969FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5F47849F-4466-4500-802C-260970D6A764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C190DE39-ABEF-4DA1-A909-B9E98BD5A468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77BB52FC-E320-47CD-A180-C22371D7AFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01A746D6-4C15-49BD-B17C-2CA06FFA76D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8664CDC-6A09-45F0-B5CD-BE5688FDBB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.5.90:*:*:*:*:*:*:*",
"matchCriteriaId": "6897D7B8-F2A3-4A18-83AF-5473E971DCDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEBBBEE-CE1D-4F4B-B0F7-428814B791BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D0E27D80-E3C5-42A2-8794-56BA0D28EFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2043930-ECC5-40C6-907E-C5AF2D3EE51D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "25706042-3E57-45D2-9917-5DDD818205FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "85B0DA93-4048-4F25-8D69-76F149D411BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "055D95AA-3797-437E-88FD-764D807B5E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7164A1F5-EE8E-46C6-8E9E-D267CF5936ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62495EC6-B5DB-4AB2-840C-98AC4CE34990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A87B2FBC-567D-4A1F-AA9C-5DA68C1AA4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD5EE9-2D1F-4042-B53A-C5BA24265709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE5D6F9-304C-4A3F-AD8E-CD7F01F8AD97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63210F22-8DC0-4B0F-BAC3-962E319D36BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "65B5D793-77FC-4333-888A-57A913EA5BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "1C2A6ADF-F539-4257-AE05-7316231106C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0AF5D1C5-DDFC-4218-B3E2-0C34768DAC33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "97928439-BB18-4F36-928C-D5FB6F08AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B190E4B8-794A-4B6E-B3E5-83ABDD381315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22B88DF3-BC03-401D-B46D-738D2AF1ACE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3980237-762C-40CE-B376-EA225C2F9214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "851F5ACE-A9AB-42BE-A36C-E9C4E333D293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rpm:rpm:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B773DF74-6F5F-4400-B971-E42BCE13A0C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en RPM 4.11.1 y anteriores permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un fichero RPM manipulado cuyo instalaci\u00f3n extrae los contenidos de ficheros temporales antes de validar la firma, tal y como fue demostrado mediante la instalaci\u00f3n de un fichero en el directorio /etc/cron.d."
}
],
"id": "CVE-2013-6435",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-12-16T18:59:00.090",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"source": "secalert@redhat.com",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/71558"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"source": "secalert@redhat.com",
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/71558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QWW5-W98G-66Q7
Vulnerability from github – Published: 2022-05-14 01:55 – Updated: 2025-04-12 12:43
VLAI?
Details
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
{
"affected": [],
"aliases": [
"CVE-2013-6435"
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-12-16T18:59:00Z",
"severity": "HIGH"
},
"details": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.",
"id": "GHSA-qww5-w98g-66q7",
"modified": "2025-04-12T12:43:06Z",
"published": "2022-05-14T01:55:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6435"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:1974"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:1975"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:1976"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2013-6435"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"type": "WEB",
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm"
},
{
"type": "WEB",
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/71558"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis - Published: 2015-10-15 - Updated: 2015-10-15
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"initial_release_date": "2015-10-15T00:00:00",
"last_revision_date": "2015-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
GSD-2013-6435
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-6435",
"description": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.",
"id": "GSD-2013-6435",
"references": [
"https://www.suse.com/security/cve/CVE-2013-6435.html",
"https://www.debian.org/security/2015/dsa-3129",
"https://access.redhat.com/errata/RHSA-2014:1976",
"https://access.redhat.com/errata/RHSA-2014:1975",
"https://access.redhat.com/errata/RHSA-2014:1974",
"https://ubuntu.com/security/CVE-2013-6435",
"https://advisories.mageia.org/CVE-2013-6435.html",
"https://alas.aws.amazon.com/cve/html/CVE-2013-6435.html",
"https://linux.oracle.com/cve/CVE-2013-6435.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-6435"
],
"details": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.",
"id": "GSD-2013-6435",
"modified": "2023-12-13T01:22:19.268144Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6435",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0529.html",
"refsource": "MISC",
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-1976.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
},
{
"name": "http://www.debian.org/security/2015/dsa-3129",
"refsource": "MISC",
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"name": "https://security.gentoo.org/glsa/201811-22",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201811-22"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-1974.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-1975.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"name": "http://www.securityfocus.com/bid/71558",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/71558"
},
{
"name": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/",
"refsource": "MISC",
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.2\\/a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.11.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.6.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.9.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:4.5.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6435"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/"
},
{
"name": "RHSA-2014:1974",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1974.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039811"
},
{
"name": "RHSA-2014:1975",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1975.html"
},
{
"name": "RHSA-2014:1976",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html"
},
{
"name": "DSA-3129",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3129"
},
{
"name": "MDVSA-2014:251",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251"
},
{
"name": "MDVSA-2015:056",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0529.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://advisories.mageia.org/MGASA-2014-0529.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "71558",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/71558"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "GLSA-201811-22",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201811-22"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:29Z",
"publishedDate": "2014-12-16T18:59Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…