CWE
345
Advisory Published
CVE Published
Updated

CVE-2021-20271

First published: Tue Mar 02 2021(Updated: )

RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacker could exploit this vulnerability to cause RPM database corruption and execute arbitrary code on the system.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
IBM Cloud Pak for Security (CP4S)<=1.7.2.0
IBM Cloud Pak for Security (CP4S)<=1.7.1.0
IBM Cloud Pak for Security (CP4S)<=1.7.0.0
Rpm Rpm>=4.15.0<4.15.1.3
Rpm Rpm>=4.16.0<4.16.1.3
Rpm Rpm=4.15.0-alpha
Rpm Rpm=4.15.0-beta1
Rpm Rpm=4.15.0-rc1
Rpm Rpm=4.16.0-alpha
Rpm Rpm=4.16.0-beta2
Rpm Rpm=4.16.0-beta3
Rpm Rpm=4.16.0-rc1
Redhat Enterprise Linux=8.0
Fedoraproject Fedora=32
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Starwindsoftware Starwind Virtual San=v8-build14398

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2021-20271?

    CVE-2021-20271 is a vulnerability in RPM that could allow a remote attacker to execute arbitrary code on the system.

  • What is the severity of CVE-2021-20271?

    CVE-2021-20271 has a severity rating of high with a CVSS score of 7.

  • Which software products are affected by CVE-2021-20271?

    Cloud Pak for Security (CP4S) versions 1.7.2.0, 1.7.1.0, and 1.7.0.0 are affected by CVE-2021-20271. Additionally, RPM versions 4.15.0 to 4.15.1.3 and 4.16.0 to 4.16.1.3 are also affected.

  • How can an attacker exploit CVE-2021-20271?

    An attacker can exploit CVE-2021-20271 by convincing a victim to install a seemingly verifiable package with a modified signature header, which can lead to RPM database corruption and code execution.

  • How can I fix CVE-2021-20271?

    To fix CVE-2021-20271, it is recommended to update to a patched version of RPM or apply the relevant security patch provided by the vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203