CVE-2013-6435 : Detail

CVE-2013-6435

A03-Injection
9.12%V3
Network
2014-12-16
17h00 +00:00
2018-11-29
09h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.6 AV:N/AC:H/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Rpm>>Rpm >> Version To (including) 4.11.1

Rpm>>Rpm >> Version 1.2

Rpm>>Rpm >> Version 1.3

Rpm>>Rpm >> Version 1.3.1

Rpm>>Rpm >> Version 1.4

Rpm>>Rpm >> Version 1.4.1

Rpm>>Rpm >> Version 1.4.2

Rpm>>Rpm >> Version 1.4.2\/a

Rpm>>Rpm >> Version 1.4.3

Rpm>>Rpm >> Version 1.4.4

Rpm>>Rpm >> Version 1.4.5

Rpm>>Rpm >> Version 1.4.6

Rpm>>Rpm >> Version 1.4.7

Rpm>>Rpm >> Version 2.0

Rpm>>Rpm >> Version 2.0.1

Rpm>>Rpm >> Version 2.0.2

Rpm>>Rpm >> Version 2.0.3

Rpm>>Rpm >> Version 2.0.4

Rpm>>Rpm >> Version 2.0.5

Rpm>>Rpm >> Version 2.0.6

Rpm>>Rpm >> Version 2.0.7

Rpm>>Rpm >> Version 2.0.8

Rpm>>Rpm >> Version 2.0.9

Rpm>>Rpm >> Version 2.0.10

Rpm>>Rpm >> Version 2.0.11

Rpm>>Rpm >> Version 2.1

Rpm>>Rpm >> Version 2.1.1

Rpm>>Rpm >> Version 2.1.2

Rpm>>Rpm >> Version 2.2

Rpm>>Rpm >> Version 2.2.1

Rpm>>Rpm >> Version 2.2.2

Rpm>>Rpm >> Version 2.2.3

Rpm>>Rpm >> Version 2.2.3.10

Rpm>>Rpm >> Version 2.2.3.11

Rpm>>Rpm >> Version 2.2.4

Rpm>>Rpm >> Version 2.2.5

Rpm>>Rpm >> Version 2.2.6

Rpm>>Rpm >> Version 2.2.7

Rpm>>Rpm >> Version 2.2.8

Rpm>>Rpm >> Version 2.2.9

Rpm>>Rpm >> Version 2.2.10

Rpm>>Rpm >> Version 2.2.11

Rpm>>Rpm >> Version 2.3

Rpm>>Rpm >> Version 2.3.1

Rpm>>Rpm >> Version 2.3.2

Rpm>>Rpm >> Version 2.3.3

Rpm>>Rpm >> Version 2.3.4

Rpm>>Rpm >> Version 2.3.5

Rpm>>Rpm >> Version 2.3.6

Rpm>>Rpm >> Version 2.3.7

Rpm>>Rpm >> Version 2.3.8

Rpm>>Rpm >> Version 2.3.9

Rpm>>Rpm >> Version 2.4.1

Rpm>>Rpm >> Version 2.4.2

Rpm>>Rpm >> Version 2.4.3

Rpm>>Rpm >> Version 2.4.4

Rpm>>Rpm >> Version 2.4.5

Rpm>>Rpm >> Version 2.4.6

Rpm>>Rpm >> Version 2.4.8

Rpm>>Rpm >> Version 2.4.9

Rpm>>Rpm >> Version 2.4.11

Rpm>>Rpm >> Version 2.4.12

Rpm>>Rpm >> Version 2.5

Rpm>>Rpm >> Version 2.5.1

Rpm>>Rpm >> Version 2.5.2

Rpm>>Rpm >> Version 2.5.3

Rpm>>Rpm >> Version 2.5.4

Rpm>>Rpm >> Version 2.5.5

Rpm>>Rpm >> Version 2.5.6

Rpm>>Rpm >> Version 2.6.7

Rpm>>Rpm >> Version 3.0

Rpm>>Rpm >> Version 3.0.1

Rpm>>Rpm >> Version 3.0.2

Rpm>>Rpm >> Version 3.0.3

Rpm>>Rpm >> Version 3.0.4

Rpm>>Rpm >> Version 3.0.5

Rpm>>Rpm >> Version 3.0.6

Rpm>>Rpm >> Version 4.0.

Rpm>>Rpm >> Version 4.0.1

Rpm>>Rpm >> Version 4.0.2

Rpm>>Rpm >> Version 4.0.3

Rpm>>Rpm >> Version 4.0.4

Rpm>>Rpm >> Version 4.1

Rpm>>Rpm >> Version 4.3.3

Rpm>>Rpm >> Version 4.4.2.1

Rpm>>Rpm >> Version 4.4.2.2

Rpm>>Rpm >> Version 4.4.2.3

Rpm>>Rpm >> Version 4.5.90

Rpm>>Rpm >> Version 4.6.0

Rpm>>Rpm >> Version 4.6.0

Rpm>>Rpm >> Version 4.6.0

Rpm>>Rpm >> Version 4.6.0

Rpm>>Rpm >> Version 4.6.0

Rpm>>Rpm >> Version 4.6.1

Rpm>>Rpm >> Version 4.7.0

Rpm>>Rpm >> Version 4.7.1

Rpm>>Rpm >> Version 4.7.2

Rpm>>Rpm >> Version 4.8.0

Rpm>>Rpm >> Version 4.8.1

Rpm>>Rpm >> Version 4.9.0

Rpm>>Rpm >> Version 4.9.0

Rpm>>Rpm >> Version 4.9.0

Rpm>>Rpm >> Version 4.9.0

Rpm>>Rpm >> Version 4.9.1

Rpm>>Rpm >> Version 4.9.1.1

Rpm>>Rpm >> Version 4.9.1.2

Rpm>>Rpm >> Version 4.10.0

Rpm>>Rpm >> Version 4.10.1

Rpm>>Rpm >> Version 4.10.2

Configuraton 0

Debian>>Debian_linux >> Version 7.0

References

http://www.mandriva.com/security/advisories?name=MDVSA-2015:056
Tags : vendor-advisory, x_refsource_MANDRIVA
https://security.gentoo.org/glsa/201811-22
Tags : vendor-advisory, x_refsource_GENTOO
http://rhn.redhat.com/errata/RHSA-2014-1975.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2014:251
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/71558
Tags : vdb-entry, x_refsource_BID
http://rhn.redhat.com/errata/RHSA-2014-1974.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2015/dsa-3129
Tags : vendor-advisory, x_refsource_DEBIAN
http://rhn.redhat.com/errata/RHSA-2014-1976.html
Tags : vendor-advisory, x_refsource_REDHAT