Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-3378
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-24 Dec, 2011 | 19:55
Updated At-11 Apr, 2025 | 00:51

RPM 4.4.x through 4.9.x, probably before 4.9.1.2, allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via an rpm package with crafted headers and offsets that are not properly handled when a package is queried or installed, related to (1) the regionSwab function, (2) the headerLoad function, and (3) multiple functions in rpmio/rpmpgp.c.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

rpm
rpm
>>rpm>>Versions up to 4.9.1.1(inclusive)
cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.4.2
cpe:2.3:a:rpm:rpm:4.4.2:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.4.2.
cpe:2.3:a:rpm:rpm:4.4.2.:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.4.2.1
cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.4.2.2
cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.4.2.3
cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.6.0
cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.6.1
cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.7.0
cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.7.1
cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.7.2
cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*
rpm
rpm
>>rpm>>4.8.0
cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691secalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.htmlsecalert@redhat.com
N/A
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3fsecalert@redhat.com
N/A
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656secalert@redhat.com
N/A
http://rpm.org/wiki/Releases/4.9.1.2#Securitysecalert@redhat.com
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:143secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/09/27/3secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2011-1349.htmlsecalert@redhat.com
Vendor Advisory
http://www.ubuntu.com/usn/USN-1695-1secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=741606secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=741612secalert@redhat.com
Exploit
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3faf854a3a-2127-422b-91ae-364da2661108
N/A
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656af854a3a-2127-422b-91ae-364da2661108
N/A
http://rpm.org/wiki/Releases/4.9.1.2#Securityaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:143af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/09/27/3af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-1349.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.ubuntu.com/usn/USN-1695-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=741606af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=741612af854a3a-2127-422b-91ae-364da2661108
Exploit
Change History
0Changes found

Details not found