It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
2018-08-13T17:29:00.357
2024-11-21T03:32:01.403
Modified
CVSSv3.0: 7.3 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rpm | rpm | < 4.13.0.2 | Yes |
Application | rpm | rpm | 4.14.0.0 | Yes |
Application | rpm | rpm | 4.14.0.0 | Yes |