fkie_cve-2012-0061
Vulnerability from fkie_nvd
Published
2012-06-04 20:55
Modified
2024-11-21 01:34
Severity ?
Summary
The headerLoad function in lib/header.c in RPM before 4.9.1.3 does not properly validate region tags, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large region size in a package header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rpm | rpm | * | |
rpm | rpm | 1.2 | |
rpm | rpm | 1.3 | |
rpm | rpm | 1.3.1 | |
rpm | rpm | 1.4 | |
rpm | rpm | 1.4.1 | |
rpm | rpm | 1.4.2 | |
rpm | rpm | 1.4.2\/a | |
rpm | rpm | 1.4.3 | |
rpm | rpm | 1.4.4 | |
rpm | rpm | 1.4.5 | |
rpm | rpm | 1.4.6 | |
rpm | rpm | 1.4.7 | |
rpm | rpm | 2.0 | |
rpm | rpm | 2.0.1 | |
rpm | rpm | 2.0.2 | |
rpm | rpm | 2.0.3 | |
rpm | rpm | 2.0.4 | |
rpm | rpm | 2.0.5 | |
rpm | rpm | 2.0.6 | |
rpm | rpm | 2.0.7 | |
rpm | rpm | 2.0.8 | |
rpm | rpm | 2.0.9 | |
rpm | rpm | 2.0.10 | |
rpm | rpm | 2.0.11 | |
rpm | rpm | 2.1 | |
rpm | rpm | 2.1.1 | |
rpm | rpm | 2.1.2 | |
rpm | rpm | 2.2 | |
rpm | rpm | 2.2.1 | |
rpm | rpm | 2.2.2 | |
rpm | rpm | 2.2.3 | |
rpm | rpm | 2.2.3.10 | |
rpm | rpm | 2.2.3.11 | |
rpm | rpm | 2.2.4 | |
rpm | rpm | 2.2.5 | |
rpm | rpm | 2.2.6 | |
rpm | rpm | 2.2.7 | |
rpm | rpm | 2.2.8 | |
rpm | rpm | 2.2.9 | |
rpm | rpm | 2.2.10 | |
rpm | rpm | 2.2.11 | |
rpm | rpm | 2.3 | |
rpm | rpm | 2.3.1 | |
rpm | rpm | 2.3.2 | |
rpm | rpm | 2.3.3 | |
rpm | rpm | 2.3.4 | |
rpm | rpm | 2.3.5 | |
rpm | rpm | 2.3.6 | |
rpm | rpm | 2.3.7 | |
rpm | rpm | 2.3.8 | |
rpm | rpm | 2.3.9 | |
rpm | rpm | 2.4.1 | |
rpm | rpm | 2.4.2 | |
rpm | rpm | 2.4.3 | |
rpm | rpm | 2.4.4 | |
rpm | rpm | 2.4.5 | |
rpm | rpm | 2.4.6 | |
rpm | rpm | 2.4.8 | |
rpm | rpm | 2.4.9 | |
rpm | rpm | 2.4.11 | |
rpm | rpm | 2.4.12 | |
rpm | rpm | 2.5 | |
rpm | rpm | 2.5.1 | |
rpm | rpm | 2.5.2 | |
rpm | rpm | 2.5.3 | |
rpm | rpm | 2.5.4 | |
rpm | rpm | 2.5.5 | |
rpm | rpm | 2.5.6 | |
rpm | rpm | 2.6.7 | |
rpm | rpm | 3.0 | |
rpm | rpm | 3.0.1 | |
rpm | rpm | 3.0.2 | |
rpm | rpm | 3.0.3 | |
rpm | rpm | 3.0.4 | |
rpm | rpm | 3.0.5 | |
rpm | rpm | 3.0.6 | |
rpm | rpm | 4.0. | |
rpm | rpm | 4.0.1 | |
rpm | rpm | 4.0.2 | |
rpm | rpm | 4.0.3 | |
rpm | rpm | 4.0.4 | |
rpm | rpm | 4.1 | |
rpm | rpm | 4.3.3 | |
rpm | rpm | 4.4.2.1 | |
rpm | rpm | 4.4.2.2 | |
rpm | rpm | 4.4.2.3 | |
rpm | rpm | 4.5.90 | |
rpm | rpm | 4.6.0 | |
rpm | rpm | 4.6.0 | |
rpm | rpm | 4.6.0 | |
rpm | rpm | 4.6.0 | |
rpm | rpm | 4.6.0 | |
rpm | rpm | 4.6.1 | |
rpm | rpm | 4.7.0 | |
rpm | rpm | 4.7.1 | |
rpm | rpm | 4.7.2 | |
rpm | rpm | 4.8.0 | |
rpm | rpm | 4.8.1 | |
rpm | rpm | 4.9.0 | |
rpm | rpm | 4.9.0 | |
rpm | rpm | 4.9.0 | |
rpm | rpm | 4.9.0 | |
rpm | rpm | 4.9.1 | |
rpm | rpm | 4.9.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EB1B63A-0D09-429B-AEAA-AA0F33E0954A", "versionEndIncluding": "4.9.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "76112E07-F476-41E5-9FF8-E85C28019BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E064D1B0-093D-4C62-89A0-481D261F9AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D05B2BC3-41EB-4839-B3DC-AF8B567D0318", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "55B95097-EEA2-42A1-AA30-4AC519E67B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "985E051C-677E-4DCD-9181-F5F33342FE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "267ACF41-E8E2-4F9E-983A-E526DACFCE82", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.2\\/a:*:*:*:*:*:*:*", "matchCriteriaId": "6429C42B-EBD6-4D93-AABB-AD268ADB72AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "1372FF29-498C-41CB-AB2E-25CEC92866AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5EFE8428-E00F-4E5F-8787-F63FEE93E617", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE4E9CC7-1BD8-490B-9C9B-E4A76EFAD13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "BFAB0B1A-A9E5-4808-85EC-0BD2A3F753AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "F3D1E892-05D5-4C79-AD12-7B7C0421E509", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CA6696D-D6CC-4C23-AB8F-91474BFC341E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B16D91A5-35F5-44F3-A515-8E4F27B563D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "08974D05-C00C-438C-A76F-E17C191D0CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "81771BF8-0788-44B5-8694-AFF436FDECD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "93BF53E9-CC37-4E31-9F34-2B569947887F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2D79478-665E-4D18-AAA6-BA51C41A4C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1A59FF59-BD73-4C13-AC51-98126ED46573", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "99C83F0D-159B-4CFB-92C6-83D36225080A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "9B7A4BC0-43DF-4542-A54F-BF8B07F30B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B926B035-659A-4F86-B680-CD1A6163F2D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "A98BC57C-69AD-40F6-885B-3A560F69809F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "71499D02-8989-4AA0-80FB-28860F103EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B424D987-8421-4FE5-B9F7-0D4AB7AC921B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9F58F12D-301C-4C4D-8F78-0B6A7B220B0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "19A30CF4-508D-407B-A097-30331AF9D452", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E49FB5B-5BFA-4736-8F2C-C07188D0BC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "883AE5CC-379E-41A7-A8B5-12671015F131", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D8FEA-89A2-4133-89D7-FD403D605E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FBDA2319-4C36-44A5-A1F2-E0F1EFC1DE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "E11322F8-93B7-457C-8993-B0A8D3274468", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "ADD35E28-313C-4CF7-AEC0-1C91316FF5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2B591779-643B-4E2E-9270-40748EDA1BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C91C9-CFDC-4C51-B6AF-51F1560161A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F9D67C30-F0CA-410B-8C3A-EA5536BC256E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "80DB9D55-9BC2-416C-9A2A-021F4EC0E884", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "7B48E845-573C-4F07-8D69-F1A54CCEEDE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9642BA0F-CBBD-4FB5-8A20-BBCAD7EC31CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "45C9FE2D-197A-45EB-BE40-B746B13F2C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E07E462F-2163-430B-9315-75BFD00113C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F650FC0-1DF8-4432-92F5-4B4DCEFC2D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "347BC012-5307-4B0F-A013-624ED455ABD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5ED89DCC-0EFF-4665-BDE0-406155A46BDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EEB6C44-B615-46F8-A5DC-BEF25D932314", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "979D846B-9DD9-474A-A8BE-25334D2969B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "DDF5DE17-2061-4896-B7DA-CFDEF46E9652", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "BB528B71-8BF5-4D93-A1BC-DF0502AEA58F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "0585DC0B-DFBB-466E-9D3D-86E19A4B88A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "041B087D-4FBC-4EDC-AAC0-DF8A1D39980A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE4FB33B-5015-4620-BD21-3F0C916069EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "684E9118-30B2-476C-816E-CA4B2916017B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "0AF46B23-559C-4DF0-8510-C79F17ABF22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "BD40A202-557B-495C-BBE5-DEC9FF97EE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F3DB711-AE17-4B3B-9D45-C38CBDF418A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF2E6A8E-4C9B-46A1-B786-6C0B3A3395F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "3D049089-7FBD-41A6-8A5B-8497DA24C720", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "20DEBEDF-3E64-4417-BC41-7F0E20C522F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "2CF99B53-237E-468B-8B7F-A105FE40803B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "E5D5F196-4BA9-43EB-BE38-EE405C8CC0FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "66C4022C-F1D4-4A58-8341-E22EAF943511", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5503DC6-40DB-4A84-984E-BDEED82F224A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "90148D48-5DA5-46F9-AE96-618C427A5DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "733E1435-CE73-4A39-97EB-304D2F45A838", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA80DA6E-CCE3-4CAF-B2A1-E6FF2B702D3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "D08FD930-F2BC-47BC-86BC-07545D1431B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "97DE028F-D0BE-435C-826D-CCBFFEBF3B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "E08EB15D-1842-41F4-9F19-FF6571055242", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "43CF2BBF-83AA-451E-8E30-E040EFCF6F64", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "409B29B1-E2E0-4CBD-83D0-F4CE67820F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D325D4A-166A-4174-BEA8-1C6D47A8DDBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6AEBBD1-2320-42A3-8DCA-46DF61007349", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E54C09F8-F0F5-4BDF-868F-0B6A4609B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "132C1B54-0438-4239-B599-8160D494EE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E5CCEAC-3D92-46DB-AC88-859ED5A5E277", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "ED68CE6A-2BF5-49F2-AEAE-199AAC94807B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*", "matchCriteriaId": "5C589CD4-5A9E-41E1-BBFA-AF4BE2DD31E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "49E406BD-8CC3-4929-ABB2-F820F8C83823", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8685704C-C43D-4315-A541-4E04B7B08B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "39C1D452-A003-4DB1-A8CF-0F7FBB9A5811", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "D4F8C79E-416F-4C88-B102-3BB60E969FAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F47849F-4466-4500-802C-260970D6A764", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C190DE39-ABEF-4DA1-A909-B9E98BD5A468", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "77BB52FC-E320-47CD-A180-C22371D7AFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "01A746D6-4C15-49BD-B17C-2CA06FFA76D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E8664CDC-6A09-45F0-B5CD-BE5688FDBB1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.5.90:*:*:*:*:*:*:*", "matchCriteriaId": "6897D7B8-F2A3-4A18-83AF-5473E971DCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FEBBBEE-CE1D-4F4B-B0F7-428814B791BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D0E27D80-E3C5-42A2-8794-56BA0D28EFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F2043930-ECC5-40C6-907E-C5AF2D3EE51D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "25706042-3E57-45D2-9917-5DDD818205FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "85B0DA93-4048-4F25-8D69-76F149D411BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "055D95AA-3797-437E-88FD-764D807B5E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7164A1F5-EE8E-46C6-8E9E-D267CF5936ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "62495EC6-B5DB-4AB2-840C-98AC4CE34990", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A87B2FBC-567D-4A1F-AA9C-5DA68C1AA4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD5EE9-2D1F-4042-B53A-C5BA24265709", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE5D6F9-304C-4A3F-AD8E-CD7F01F8AD97", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "63210F22-8DC0-4B0F-BAC3-962E319D36BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "65B5D793-77FC-4333-888A-57A913EA5BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "1C2A6ADF-F539-4257-AE05-7316231106C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0AF5D1C5-DDFC-4218-B3E2-0C34768DAC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "97928439-BB18-4F36-928C-D5FB6F08AC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:rpm:rpm:4.9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B190E4B8-794A-4B6E-B3E5-83ABDD381315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The headerLoad function in lib/header.c in RPM before 4.9.1.3 does not properly validate region tags, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large region size in a package header." }, { "lang": "es", "value": "La funci\u00f3n headerLoad de lib/header.c de RPM anteriores a 4.9.1.3 no validan apropiadamente las etiquetas \"region\", lo que permite a atacantes remotos asistidos por el usuario provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de tama\u00f1o extenso de \"region\" en una cabecera de paquete." } ], "id": "CVE-2012-0061", "lastModified": "2024-11-21T01:34:18.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-06-04T20:55:01.790", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0451.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "source": "secalert@redhat.com", "url": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=472e569562d4c90d7a298080e0052856aa7fa86b" }, { "source": "secalert@redhat.com", "url": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=858a328cd0f7d4bcd8500c78faaf00e4f8033df6" }, { "source": "secalert@redhat.com", "url": "http://rpm.org/wiki/Releases/4.9.1.3" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48651" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48716" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49110" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:056" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/81010" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52865" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026882" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1695-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=798585" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74583" }, { "source": "secalert@redhat.com", "url": "https://hermes.opensuse.org/messages/14440932" }, { "source": "secalert@redhat.com", "url": "https://hermes.opensuse.org/messages/14441362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0451.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=472e569562d4c90d7a298080e0052856aa7fa86b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=858a328cd0f7d4bcd8500c78faaf00e4f8033df6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rpm.org/wiki/Releases/4.9.1.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/81010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1695-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=798585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14440932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/14441362" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.