ID CVE-2006-5466
Summary Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages. Successful exploitation may allow the execution of arbitrary code, but requires that certain locales are set (e.g. ru_RU.UTF-8). There are patches available for each affected Ubuntu product.
References
Vulnerable Configurations
  • cpe:2.3:a:rpm:package_manager:4.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:rpm:package_manager:4.4.8:*:*:*:*:*:*:*
  • cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
    cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
  • cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
    cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
CVSS
Base: 5.4 (as of 08-03-2011 - 02:43)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:H/Au:N/C:N/I:N/A:C
refmap via4
bid 20906
gentoo GLSA-200611-08
mandriva MDKSA-2006:200
misc https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833
sectrack 1017160
secunia
  • 22740
  • 22745
  • 22768
  • 22854
ubuntu USN-378-1
vupen ADV-2006-4350
statements via4
contributor Joshua Bressers
lastmodified 2007-03-14
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213515 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Last major update 08-03-2011 - 02:43
Published 06-11-2006 - 17:07
Last modified 08-03-2011 - 02:43
Back to Top