4.3
CVSSv2

CVE-2021-3421

Published: 19/05/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions prior to 4.17.0-alpha.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rpm rpm

redhat enterprise linux 8.0

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #985308 CVE-2021-3421 CVE-2021-20271 CVE-2021-20266 CVE-2021-20249 CVE-2021-20248 Package: rpm; Maintainer for rpm is RPM packaging team <team+pkg-rpm@trackerdebianorg>; Source for rpm is src:rpm (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 15 Mar 2021 1 ...
A flaw was found in RPM's signature check functionality when reading a package file This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code The highest threat from this vulnerability is to data integrity, confidentialit ...
A flaw was found in RPM's signature check functionality when reading a package file This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code The highest threat from this vulnerability is to data integrity, confidentialit ...
A flaw was found in the RPM package in the read functionality This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption The highest threat from this vulnerability is to data integrity ...