6.8
CVSSv2

CVE-2012-0060

Published: 04/06/2012 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

RPM prior to 4.9.1.3 does not properly validate region tags, which allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an invalid region tag in a package header to the (1) headerLoad, (2) rpmReadSignature, or (3) headerVerify function.

Vulnerable Product Search on Vulmon Subscribe to Product

rpm rpm 2.3.5

rpm rpm 4.4.2.1

rpm rpm 1.4.3

rpm rpm 3.0.1

rpm rpm 4.1

rpm rpm 2.2.3.11

rpm rpm 4.8.0

rpm rpm 2.4.4

rpm rpm 2.3.8

rpm rpm 2.0.6

rpm rpm 1.4.4

rpm rpm 1.4.2\\/a

rpm rpm 2.4.1

rpm rpm 2.4.9

rpm rpm 2.6.7

rpm rpm

rpm rpm 1.4

rpm rpm 2.0.10

rpm rpm 2.4.5

rpm rpm 4.9.0

rpm rpm 4.0.1

rpm rpm 2.2.11

rpm rpm 4.0.4

rpm rpm 2.2.1

rpm rpm 2.0.1

rpm rpm 1.4.2

rpm rpm 3.0.3

rpm rpm 2.0.7

rpm rpm 4.0.2

rpm rpm 2.2.8

rpm rpm 3.0.2

rpm rpm 4.6.0

rpm rpm 1.2

rpm rpm 4.0.

rpm rpm 2.1.1

rpm rpm 4.3.3

rpm rpm 2.5.5

rpm rpm 2.0.8

rpm rpm 4.8.1

rpm rpm 2.3

rpm rpm 4.4.2.2

rpm rpm 2.4.8

rpm rpm 3.0.4

rpm rpm 2.5.6

rpm rpm 2.0

rpm rpm 2.0.2

rpm rpm 2.3.2

rpm rpm 2.4.3

rpm rpm 2.4.2

rpm rpm 1.4.5

rpm rpm 2.0.11

rpm rpm 3.0.5

rpm rpm 1.3

rpm rpm 4.7.2

rpm rpm 4.9.1

rpm rpm 2.2.3

rpm rpm 2.2

rpm rpm 2.1.2

rpm rpm 2.3.9

rpm rpm 2.2.4

rpm rpm 2.2.9

rpm rpm 2.5.3

rpm rpm 2.2.6

rpm rpm 4.7.0

rpm rpm 2.3.6

rpm rpm 2.5

rpm rpm 2.2.3.10

rpm rpm 4.9.1.1

rpm rpm 2.0.5

rpm rpm 1.4.1

rpm rpm 4.4.2.3

rpm rpm 2.4.12

rpm rpm 2.5.4

rpm rpm 4.6.1

rpm rpm 1.4.7

rpm rpm 3.0

rpm rpm 1.4.6

rpm rpm 2.5.2

rpm rpm 2.4.11

rpm rpm 2.0.9

rpm rpm 2.1

rpm rpm 2.2.10

rpm rpm 2.3.3

rpm rpm 2.3.7

rpm rpm 2.3.4

rpm rpm 4.7.1

rpm rpm 2.0.4

rpm rpm 1.3.1

rpm rpm 3.0.6

rpm rpm 2.0.3

rpm rpm 2.3.1

rpm rpm 4.0.3

rpm rpm 2.4.6

rpm rpm 4.5.90

rpm rpm 2.5.1

rpm rpm 2.2.5

rpm rpm 2.2.2

rpm rpm 2.2.7

Vendor Advisories

Synopsis Important: rpm security update Type/Severity Security Advisory: Important Topic Updated rpm packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 3 and 4Extended Life Cycle Support; Red Hat Enterprise Linux 53 Long Life; andRed H ...
Debian Bug report logs - #667031 Multiple security issues Package: rpm; Maintainer for rpm is RPM packaging team <team+pkg-rpm@trackerdebianorg>; Source for rpm is src:rpm (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 3 Apr 2012 14:30:01 UTC Severity: grave Tags: sec ...
RPM could be made to crash or run programs if it opened a specially crafted package file ...
Multiple flaws were found in the way RPM parsed package file headers An attacker could create a specially-crafted RPM package that, when its package header was accessed, or during package signature verification, could cause an application using the RPM library (such as the rpm command line tool, or the yum and up2date package managers) to crash or ...