CVE-2012-0060

RPM before 4.9.1.3 does not properly validate region tags, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an invalid region tag in a package header to the (1) headerLoad, (2) rpmReadSignature, or (3) headerVerify function.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html
http://rhn.redhat.com/errata/RHSA-2012-0451.html
http://rhn.redhat.com/errata/RHSA-2012-0531.html
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=f23998251992b8ae25faf5113c42fee2c49c7f29
http://rpm.org/wiki/Releases/4.9.1.3
http://secunia.com/advisories/48651 Vendor Advisory
http://secunia.com/advisories/48716 Vendor Advisory
http://secunia.com/advisories/49110 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:056
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.osvdb.org/81010
http://www.securityfocus.com/bid/52865
http://www.securitytracker.com/id?1026882
http://www.ubuntu.com/usn/USN-1695-1
https://bugzilla.redhat.com/show_bug.cgi?id=744858
https://exchange.xforce.ibmcloud.com/vulnerabilities/74582
https://hermes.opensuse.org/messages/14440932
https://hermes.opensuse.org/messages/14441362
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html
http://rhn.redhat.com/errata/RHSA-2012-0451.html
http://rhn.redhat.com/errata/RHSA-2012-0531.html
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=f23998251992b8ae25faf5113c42fee2c49c7f29
http://rpm.org/wiki/Releases/4.9.1.3
http://secunia.com/advisories/48651 Vendor Advisory
http://secunia.com/advisories/48716 Vendor Advisory
http://secunia.com/advisories/49110 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:056
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.osvdb.org/81010
http://www.securityfocus.com/bid/52865
http://www.securitytracker.com/id?1026882
http://www.ubuntu.com/usn/USN-1695-1
https://bugzilla.redhat.com/show_bug.cgi?id=744858
https://exchange.xforce.ibmcloud.com/vulnerabilities/74582
https://hermes.opensuse.org/messages/14440932
https://hermes.opensuse.org/messages/14441362
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.2\/a:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.5.90:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.0:rc4:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.8.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.0:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.0:alpha:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.1:*:*:*:*:*:*:*
cpe:2.3:a:rpm:rpm:4.9.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:34

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077960.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078819.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078907.html -
References () http://rhn.redhat.com/errata/RHSA-2012-0451.html - () http://rhn.redhat.com/errata/RHSA-2012-0451.html -
References () http://rhn.redhat.com/errata/RHSA-2012-0531.html - () http://rhn.redhat.com/errata/RHSA-2012-0531.html -
References () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190 - () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190 -
References () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=f23998251992b8ae25faf5113c42fee2c49c7f29 - () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=f23998251992b8ae25faf5113c42fee2c49c7f29 -
References () http://rpm.org/wiki/Releases/4.9.1.3 - () http://rpm.org/wiki/Releases/4.9.1.3 -
References () http://secunia.com/advisories/48651 - Vendor Advisory () http://secunia.com/advisories/48651 - Vendor Advisory
References () http://secunia.com/advisories/48716 - Vendor Advisory () http://secunia.com/advisories/48716 - Vendor Advisory
References () http://secunia.com/advisories/49110 - Vendor Advisory () http://secunia.com/advisories/49110 - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:056 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:056 -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -
References () http://www.osvdb.org/81010 - () http://www.osvdb.org/81010 -
References () http://www.securityfocus.com/bid/52865 - () http://www.securityfocus.com/bid/52865 -
References () http://www.securitytracker.com/id?1026882 - () http://www.securitytracker.com/id?1026882 -
References () http://www.ubuntu.com/usn/USN-1695-1 - () http://www.ubuntu.com/usn/USN-1695-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=744858 - () https://bugzilla.redhat.com/show_bug.cgi?id=744858 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74582 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/74582 -
References () https://hermes.opensuse.org/messages/14440932 - () https://hermes.opensuse.org/messages/14440932 -
References () https://hermes.opensuse.org/messages/14441362 - () https://hermes.opensuse.org/messages/14441362 -

07 Nov 2023, 02:09

Type Values Removed Values Added
References
  • {'url': 'http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=f23998251992b8ae25faf5113c42fee2c49c7f29', 'name': 'http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=f23998251992b8ae25faf5113c42fee2c49c7f29', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190', 'name': 'http://rpm.org/gitweb?p=rpm.git;a=commitdiff;h=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=e4eab2bc6d07cfd33f740071de7ddbb2fe2f4190 -
  • () http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=f23998251992b8ae25faf5113c42fee2c49c7f29 -

Information

Published : 2012-06-04 20:55

Updated : 2024-11-21 01:34


NVD link : CVE-2012-0060

Mitre link : CVE-2012-0060

CVE.ORG link : CVE-2012-0060


JSON object : View

Products Affected

rpm

  • rpm
CWE
CWE-20

Improper Input Validation