CVE-2013-6435

Impact:
Important
Public Date:
2014-12-09
CWE:
CWE-367
Bugzilla:
1039811: CVE-2013-6435 rpm: race condition during the installation process
It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.

Find out more about CVE-2013-6435 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.6
Base Metrics AV:N/AC:H/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (rpm) RHSA-2014:1976 2014-12-09
Red Hat Enterprise Linux EUS (v. 5.9 server) (rpm) RHSA-2014:1975 2014-12-09
Red Hat Enterprise Linux Advanced Update Support 6.2 (rpm) RHSA-2014:1975 2014-12-09
Red Hat Enterprise Linux 5 (rpm) RHSA-2014:1974 2014-12-09
Red Hat Enterprise Linux Long Life (v. 5.6 server) (rpm) RHSA-2014:1975 2014-12-09
Red Hat Enterprise Linux Extended Update Support 6.4 (rpm) RHSA-2014:1975 2014-12-09
Red Hat Enterprise Linux Extended Update Support 6.5 (rpm) RHSA-2014:1975 2014-12-09
Red Hat Enterprise Linux 6 (rpm) RHSA-2014:1974 2014-12-09

Acknowledgements

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Last Modified