CVE-2014-0022
yum: yum-cron installs unsigned packages
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package.
La función installUpdates en yum-cron/yum-cron.py en yum 3.4.3 y anteriores no chequea apropiadamente el valor de retorno de la función sigCheckPkg, lo cual permite a atacantes remotos sortear la restricción de firmado de paquetes RMP a través de un paquete no firmado.
It was discovered that yum-updatesd did not properly perform RPM package signature checks. When yum-updatesd was configured to automatically install updates, a remote attacker could use this flaw to install a malicious update on the target system using an unsigned RPM or an RPM signed with an untrusted key.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-01-26 CVE Published
- 2023-12-09 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/65119 | Vdb Entry | |
http://yum.baseurl.org/gitweb?p=yum.git%3Ba=commitdiff%3Bh=9df69e5794 | X_refsource_confirm | |
https://bugzilla.redhat.com/show_bug.cgi?id=1052440 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/56637 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1057377 | 2014-08-05 | |
https://access.redhat.com/security/cve/CVE-2014-0022 | 2014-08-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Baseurl Search vendor "Baseurl" | Yum Search vendor "Baseurl" for product "Yum" | <= 3.4.3 Search vendor "Baseurl" for product "Yum" and version " <= 3.4.3" | - |
Affected
| ||||||
Baseurl Search vendor "Baseurl" | Yum Search vendor "Baseurl" for product "Yum" | 3.4.0 Search vendor "Baseurl" for product "Yum" and version "3.4.0" | - |
Affected
| ||||||
Baseurl Search vendor "Baseurl" | Yum Search vendor "Baseurl" for product "Yum" | 3.4.1 Search vendor "Baseurl" for product "Yum" and version "3.4.1" | - |
Affected
| ||||||
Baseurl Search vendor "Baseurl" | Yum Search vendor "Baseurl" for product "Yum" | 3.4.2 Search vendor "Baseurl" for product "Yum" and version "3.4.2" | - |
Affected
|