ID |
CVE-2002-2204
|
Summary |
The default --checksig setting in RPM Package Manager 4.0.4 checks that a package's signature is valid without listing who signed it, which can allow remote attackers to make it appear that a malicious package comes from a trusted source. A large degree of social engineering and user interaction is neccessary to exploit this vulnerbility. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:redhat:redhat_package_manager:4.0.2-71:*:*:*:*:*:*:*
cpe:2.3:a:redhat:redhat_package_manager:4.0.2-71:*:*:*:*:*:*:*
-
cpe:2.3:a:redhat:redhat_package_manager:4.0.2-72:*:*:*:*:*:*:*
cpe:2.3:a:redhat:redhat_package_manager:4.0.2-72:*:*:*:*:*:*:*
-
cpe:2.3:a:redhat:redhat_package_manager:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:redhat_package_manager:4.0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:redhat:redhat_package_manager:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:redhat_package_manager:4.0.4:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 05-09-2008 - 20:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 5594 | fulldisc | 20020829 RPM verification | xf | rpm-improper-sig-verification(10011) |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-30 | organization | Red Hat | statement | We do not believe this is a security vulnerability. This is the documented and expected behaviour of rpm. |
|
Last major update |
05-09-2008 - 20:32 |
Published |
31-12-2002 - 05:00 |
Last modified |
05-09-2008 - 20:32 |