First published: Tue Dec 10 2013(Updated: )
IssueDescription: It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
RPM Package Manager | <=4.11.1 | |
RPM Package Manager | =1.2 | |
RPM Package Manager | =1.3 | |
RPM Package Manager | =1.3.1 | |
RPM Package Manager | =1.4 | |
RPM Package Manager | =1.4.1 | |
RPM Package Manager | =1.4.2 | |
RPM Package Manager | =1.4.2\/a | |
RPM Package Manager | =1.4.3 | |
RPM Package Manager | =1.4.4 | |
RPM Package Manager | =1.4.5 | |
RPM Package Manager | =1.4.6 | |
RPM Package Manager | =1.4.7 | |
RPM Package Manager | =2.0 | |
RPM Package Manager | =2.0.1 | |
RPM Package Manager | =2.0.2 | |
RPM Package Manager | =2.0.3 | |
RPM Package Manager | =2.0.4 | |
RPM Package Manager | =2.0.5 | |
RPM Package Manager | =2.0.6 | |
RPM Package Manager | =2.0.7 | |
RPM Package Manager | =2.0.8 | |
RPM Package Manager | =2.0.9 | |
RPM Package Manager | =2.0.10 | |
RPM Package Manager | =2.0.11 | |
RPM Package Manager | =2.1 | |
RPM Package Manager | =2.1.1 | |
RPM Package Manager | =2.1.2 | |
RPM Package Manager | =2.2 | |
RPM Package Manager | =2.2.1 | |
RPM Package Manager | =2.2.2 | |
RPM Package Manager | =2.2.3 | |
RPM Package Manager | =2.2.3.10 | |
RPM Package Manager | =2.2.3.11 | |
RPM Package Manager | =2.2.4 | |
RPM Package Manager | =2.2.5 | |
RPM Package Manager | =2.2.6 | |
RPM Package Manager | =2.2.7 | |
RPM Package Manager | =2.2.8 | |
RPM Package Manager | =2.2.9 | |
RPM Package Manager | =2.2.10 | |
RPM Package Manager | =2.2.11 | |
RPM Package Manager | =2.3 | |
RPM Package Manager | =2.3.1 | |
RPM Package Manager | =2.3.2 | |
RPM Package Manager | =2.3.3 | |
RPM Package Manager | =2.3.4 | |
RPM Package Manager | =2.3.5 | |
RPM Package Manager | =2.3.6 | |
RPM Package Manager | =2.3.7 | |
RPM Package Manager | =2.3.8 | |
RPM Package Manager | =2.3.9 | |
RPM Package Manager | =2.4.1 | |
RPM Package Manager | =2.4.2 | |
RPM Package Manager | =2.4.3 | |
RPM Package Manager | =2.4.4 | |
RPM Package Manager | =2.4.5 | |
RPM Package Manager | =2.4.6 | |
RPM Package Manager | =2.4.8 | |
RPM Package Manager | =2.4.9 | |
RPM Package Manager | =2.4.11 | |
RPM Package Manager | =2.4.12 | |
RPM Package Manager | =2.5 | |
RPM Package Manager | =2.5.1 | |
RPM Package Manager | =2.5.2 | |
RPM Package Manager | =2.5.3 | |
RPM Package Manager | =2.5.4 | |
RPM Package Manager | =2.5.5 | |
RPM Package Manager | =2.5.6 | |
RPM Package Manager | =2.6.7 | |
RPM Package Manager | =3.0 | |
RPM Package Manager | =3.0.1 | |
RPM Package Manager | =3.0.2 | |
RPM Package Manager | =3.0.3 | |
RPM Package Manager | =3.0.4 | |
RPM Package Manager | =3.0.5 | |
RPM Package Manager | =3.0.6 | |
RPM Package Manager | =4.0. | |
RPM Package Manager | =4.0.1 | |
RPM Package Manager | =4.0.2 | |
RPM Package Manager | =4.0.3 | |
RPM Package Manager | =4.0.4 | |
RPM Package Manager | =4.1 | |
RPM Package Manager | =4.3.3 | |
RPM Package Manager | =4.4.2.1 | |
RPM Package Manager | =4.4.2.2 | |
RPM Package Manager | =4.4.2.3 | |
RPM Package Manager | =4.5.90 | |
RPM Package Manager | =4.6.0 | |
RPM Package Manager | =4.6.0-rc1 | |
RPM Package Manager | =4.6.0-rc2 | |
RPM Package Manager | =4.6.0-rc3 | |
RPM Package Manager | =4.6.0-rc4 | |
RPM Package Manager | =4.6.1 | |
RPM Package Manager | =4.7.0 | |
RPM Package Manager | =4.7.1 | |
RPM Package Manager | =4.7.2 | |
RPM Package Manager | =4.8.0 | |
RPM Package Manager | =4.8.1 | |
RPM Package Manager | =4.9.0 | |
RPM Package Manager | =4.9.0-alpha | |
RPM Package Manager | =4.9.0-beta1 | |
RPM Package Manager | =4.9.0-rc1 | |
RPM Package Manager | =4.9.1 | |
RPM Package Manager | =4.9.1.1 | |
RPM Package Manager | =4.9.1.2 | |
RPM Package Manager | =4.10.0 | |
RPM Package Manager | =4.10.1 | |
RPM Package Manager | =4.10.2 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6435 has a high severity rating due to its potential to allow unverified file execution.
To fix CVE-2013-6435, you should upgrade to a version of RPM Package Manager that is newer than 4.11.1 and apply the available security patch.
CVE-2013-6435 affects various versions of the RPM Package Manager, including versions from 1.2 up to 4.11.1.
CVE-2013-6435 is classified as a file handling vulnerability that involves the processing of unverified temporary files.
While the best solution is to update RPM, temporarily restricting access to unverified files can serve as a workaround until an update is applied.