ID CVE-2017-7480
Summary rkhunter versions before 1.4.4 are vulnerable to file download over insecure channel when doing mirror update resulting into potential remote code execution.
References
Vulnerable Configurations
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc1:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc2:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc3:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.00:rc3:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 09-09-2020 - 15:11)
Impact:
Exploitability:
CWE CWE-417
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
gentoo GLSA-201805-11
mlist [oss-security] 20170629 rkhunter: [CVE-2017-7480] Potential RCE after MiTM due to clear text download without signature
Last major update 09-09-2020 - 15:11
Published 21-07-2017 - 22:29
Last modified 09-09-2020 - 15:11
Back to Top