CVE-2011-3378

RPM 4.4.x through 4.9.x, probably before 4.9.1.2, allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via an rpm package with crafted headers and offsets that are not properly handled when a package is queried or installed, related to (1) the regionSwab function, (2) the headerLoad function, and (3) multiple functions in rpmio/rpmpgp.c.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.html
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3f
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656
http://rpm.org/wiki/Releases/4.9.1.2#Security Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:143
http://www.openwall.com/lists/oss-security/2011/09/27/3
http://www.redhat.com/support/errata/RHSA-2011-1349.html Vendor Advisory
http://www.ubuntu.com/usn/USN-1695-1
https://bugzilla.redhat.com/show_bug.cgi?id=741606
https://bugzilla.redhat.com/show_bug.cgi?id=741612 Exploit
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.html
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3f
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656
http://rpm.org/wiki/Releases/4.9.1.2#Security Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:143
http://www.openwall.com/lists/oss-security/2011/09/27/3
http://www.redhat.com/support/errata/RHSA-2011-1349.html Vendor Advisory
http://www.ubuntu.com/usn/USN-1695-1
https://bugzilla.redhat.com/show_bug.cgi?id=741606
https://bugzilla.redhat.com/show_bug.cgi?id=741612 Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:30

Type Values Removed Values Added
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 -
References () http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.html -
References () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3f - () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3f -
References () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656 - () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656 -
References () http://rpm.org/wiki/Releases/4.9.1.2#Security - Vendor Advisory () http://rpm.org/wiki/Releases/4.9.1.2#Security - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:143 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:143 -
References () http://www.openwall.com/lists/oss-security/2011/09/27/3 - () http://www.openwall.com/lists/oss-security/2011/09/27/3 -
References () http://www.redhat.com/support/errata/RHSA-2011-1349.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2011-1349.html - Vendor Advisory
References () http://www.ubuntu.com/usn/USN-1695-1 - () http://www.ubuntu.com/usn/USN-1695-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=741606 - () https://bugzilla.redhat.com/show_bug.cgi?id=741606 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=741612 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=741612 - Exploit

Information

Published : 2011-12-24 19:55

Updated : 2024-11-21 01:30


NVD link : CVE-2011-3378

Mitre link : CVE-2011-3378

CVE.ORG link : CVE-2011-3378


JSON object : View

Products Affected

rpm

  • rpm
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')