HomeRpmCVE-2013-6435

CVE-2013-6435

UNKNOWN
7.6CVSS
Published: 2014-12-16
Updated: 2025-04-12
AI Analysis

Description

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS Metrics

Vector
AV:N/AC:H/Au:N/C:C/I:C/A:C
Access Vector
network
Access Cmplx
high
Auth
none
Confidentiality
complete
Integrity
complete
Availability
complete
Weaknesses
CWE-74

Metadata

Primary Vendor
RPM
Published
12/16/2014
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

rpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmrpm : rpmdebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2013-6435 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com