First published: Mon Aug 13 2018(Updated: )
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
RPM Package Manager | >=4.13.0.0<4.13.0.2 | |
RPM Package Manager | =4.14.0.0-rc1 | |
RPM Package Manager | =4.14.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7500 is a vulnerability found in the RPM package manager that allows an attacker with write access to a directory to change ownership and permissions of arbitrary directories.
The severity of CVE-2017-7500 is high with a CVSS score of 7.8.
The RPM package manager versions 4.13.0.0 to 4.13.0.2, 4.14.0.0-rc1, and 4.14.0.0-rc2 are affected by CVE-2017-7500.
An attacker with write access to a directory in the RPM package installation path can exploit CVE-2017-7500.
Yes, you can find more information about CVE-2017-7500 at the following references: - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500) - [RPM Software Management Commit 1](https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9) - [RPM Software Management Commit 2](https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79)