Vulnerability Description
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rpm | Rpm | <= 4.11.1 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0529.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://rhn.redhat.com/errata/RHSA-2014-1974.html
- http://rhn.redhat.com/errata/RHSA-2014-1975.html
- http://rhn.redhat.com/errata/RHSA-2014-1976.html
- http://www.debian.org/security/2015/dsa-3129
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htm
- http://www.securityfocus.com/bid/71558
- https://bugzilla.redhat.com/show_bug.cgi?id=1039811
- https://security.gentoo.org/glsa/201811-22
- https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in
- http://advisories.mageia.org/MGASA-2014-0529.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
FAQ
What is CVE-2013-6435?
CVE-2013-6435 is a vulnerability with a CVSS score of 7.6 (HIGH). Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the sign...
How severe is CVE-2013-6435?
CVE-2013-6435 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6435?
Check the references section above for vendor advisories and patch information. Affected products include: Rpm Rpm, Debian Debian Linux.