Vulnerability Description
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rpm | Rpm | >= 4.13.0.0, < 4.13.0.2 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500Issue Tracking
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624Third Party Advisory
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd0Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500Issue Tracking
- https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624Third Party Advisory
- https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd0Third Party Advisory
FAQ
What is CVE-2017-7500?
CVE-2017-7500 is a vulnerability with a CVSS score of 7.3 (HIGH). It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and R...
How severe is CVE-2017-7500?
CVE-2017-7500 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7500?
Check the references section above for vendor advisories and patch information. Affected products include: Rpm Rpm.