ID CVE-2002-2204
Summary The default --checksig setting in RPM Package Manager 4.0.4 checks that a package's signature is valid without listing who signed it, which can allow remote attackers to make it appear that a malicious package comes from a trusted source. A large degree of social engineering and user interaction is neccessary to exploit this vulnerbility.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:redhat_package_manager:4.0.2-71:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:redhat_package_manager:4.0.2-71:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:redhat_package_manager:4.0.2-72:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:redhat_package_manager:4.0.2-72:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:redhat_package_manager:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:redhat_package_manager:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:redhat_package_manager:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:redhat_package_manager:4.0.4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 5594
fulldisc 20020829 RPM verification
xf rpm-improper-sig-verification(10011)
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement We do not believe this is a security vulnerability. This is the documented and expected behaviour of rpm.
Last major update 05-09-2008 - 20:32
Published 31-12-2002 - 05:00
Last modified 05-09-2008 - 20:32
Back to Top