[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-458 ---- rpm

ID: oval:org.secpod.oval:def:1600075Date: (C)2016-01-19   (M)2023-12-07
Class: PATCHFamily: unix




It was found that RPM could encounter an integer overflow, leading to a stack-based overflow, while parsing a crafted CPIO header in the payload section of an RPM file. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. Red Hat has published an excellent analysis of this issue

Platform:
Amazon Linux AMI
Product:
rpm
Reference:
ALAS-2014-458
CVE-2014-8118
CVE-2013-6435
CVE    2
CVE-2014-8118
CVE-2013-6435
CPE    111
cpe:/a:rpm:rpm:4.10.2
cpe:/a:rpm:rpm:4.10.1
cpe:/a:rpm:rpm:4.0.2
cpe:/a:rpm:rpm:4.0.3
...

© SecPod Technologies