Description
Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
CVSS Metrics
- Vector
- AV:N/AC:H/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- high
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- CWE-74
Metadata
- Primary Vendor
- RPM
- Published
- 12/16/2014
- Last Modified
- 4/12/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
rpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmdebian : debian_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.