First published: Tue Jun 08 2010(Updated: )
rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RPM Package Manager | =1.2 | |
RPM Package Manager | =1.3 | |
RPM Package Manager | =1.3.1 | |
RPM Package Manager | =1.4 | |
RPM Package Manager | =1.4.2 | |
RPM Package Manager | =1.4.2\/a | |
RPM Package Manager | =1.4.3 | |
RPM Package Manager | =1.4.4 | |
RPM Package Manager | =1.4.5 | |
RPM Package Manager | =1.4.6 | |
RPM Package Manager | =1.4.7 | |
RPM Package Manager | =2..4.10 | |
RPM Package Manager | =2.0 | |
RPM Package Manager | =2.0.1 | |
RPM Package Manager | =2.0.2 | |
RPM Package Manager | =2.0.3 | |
RPM Package Manager | =2.0.4 | |
RPM Package Manager | =2.0.5 | |
RPM Package Manager | =2.0.6 | |
RPM Package Manager | =2.0.7 | |
RPM Package Manager | =2.0.8 | |
RPM Package Manager | =2.0.9 | |
RPM Package Manager | =2.0.10 | |
RPM Package Manager | =2.0.11 | |
RPM Package Manager | =2.1 | |
RPM Package Manager | =2.1.1 | |
RPM Package Manager | =2.1.2 | |
RPM Package Manager | =2.2 | |
RPM Package Manager | =2.2.1 | |
RPM Package Manager | =2.2.2 | |
RPM Package Manager | =2.2.3 | |
RPM Package Manager | =2.2.3.10 | |
RPM Package Manager | =2.2.3.11 | |
RPM Package Manager | =2.2.4 | |
RPM Package Manager | =2.2.5 | |
RPM Package Manager | =2.2.6 | |
RPM Package Manager | =2.2.7 | |
RPM Package Manager | =2.2.8 | |
RPM Package Manager | =2.2.9 | |
RPM Package Manager | =2.2.10 | |
RPM Package Manager | =2.2.11 | |
RPM Package Manager | =2.3 | |
RPM Package Manager | =2.3.1 | |
RPM Package Manager | =2.3.2 | |
RPM Package Manager | =2.3.3 | |
RPM Package Manager | =2.3.4 | |
RPM Package Manager | =2.3.5 | |
RPM Package Manager | =2.3.6 | |
RPM Package Manager | =2.3.7 | |
RPM Package Manager | =2.3.8 | |
RPM Package Manager | =2.3.9 | |
RPM Package Manager | =2.4.1 | |
RPM Package Manager | =2.4.2 | |
RPM Package Manager | =2.4.3 | |
RPM Package Manager | =2.4.4 | |
RPM Package Manager | =2.4.5 | |
RPM Package Manager | =2.4.6 | |
RPM Package Manager | =2.4.8 | |
RPM Package Manager | =2.4.9 | |
RPM Package Manager | =2.4.11 | |
RPM Package Manager | =2.4.12 | |
RPM Package Manager | =2.5 | |
RPM Package Manager | =2.5.1 | |
RPM Package Manager | =2.5.2 | |
RPM Package Manager | =2.5.3 | |
RPM Package Manager | =2.5.4 | |
RPM Package Manager | =2.5.5 | |
RPM Package Manager | =2.5.6 | |
RPM Package Manager | =2.6.7 | |
RPM Package Manager | =3.0 | |
RPM Package Manager | =3.0.1 | |
RPM Package Manager | =3.0.2 | |
RPM Package Manager | =3.0.3 | |
RPM Package Manager | =3.0.4 | |
RPM Package Manager | =3.0.5 | |
RPM Package Manager | =3.0.6 | |
RPM Package Manager | =4.0. | |
RPM Package Manager | =4.0.1 | |
RPM Package Manager | =4.0.2 | |
RPM Package Manager | =4.0.3 | |
RPM Package Manager | =4.0.4 | |
RPM Package Manager | =4.1 | |
RPM Package Manager | =4.3.3 | |
RPM Package Manager | =4.4.2 | |
RPM Package Manager | =4.4.2.1 | |
RPM Package Manager | =4.4.2.2 | |
RPM Package Manager | =4.4.2.3 | |
RPM Package Manager | <=4.8.0 | |
RPM Package Manager | =4.6.0 | |
RPM Package Manager | =4.6.1 | |
RPM Package Manager | =4.7.0 | |
RPM Package Manager | =4.7.1 | |
RPM Package Manager | =4.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2197 has a high severity rating due to its potential to allow attackers to delete home directories on affected systems.
To fix CVE-2010-2197, upgrade to RPM version 4.8.1 or later, which includes the necessary patches.
CVE-2010-2197 affects RPM versions up to 4.8.0, including numerous older versions across several major releases.
Yes, CVE-2010-2197 can be exploited remotely if a user assists in its execution through crafted input.
While full mitigation involves patching, limiting user privileges and monitoring file modifications may help reduce risk.