First published: Fri Jan 18 2013(Updated: )
The rpmpkgRead function in lib/package.c in RPM 4.10.x before 4.10.2 does not return an error code in certain situations involving an "unparseable signature," which allows remote attackers to bypass RPM signature checks via a crafted package.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
RPM Package Manager | =4.10.0 | |
RPM Package Manager | =4.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6088 is classified as a high severity vulnerability due to its potential to allow remote attackers to bypass RPM signature checks.
To fix CVE-2012-6088, you should upgrade to RPM version 4.10.2 or later, which addresses this vulnerability.
CVE-2012-6088 affects users of RPM versions 4.10.0 and 4.10.1.
CVE-2012-6088 can be exploited by remote attackers who deliver crafted packages that contain unparseable signatures to bypass signature verification.
The impact of CVE-2012-6088 on system security is significant, as it allows malicious packages to be installed without proper validation, potentially leading to system compromise.