- Description
- up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:up2date:3.0.7-1:*:i386:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EF04F053-8845-4599-A238-6D4B729A558D"
},
{
"criteria": "cpe:2.3:a:redhat:up2date:3.0.7-1:*:i386_gnome:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8A584844-43A9-486A-8E4E-8D20CBD34B8E"
},
{
"criteria": "cpe:2.3:a:redhat:up2date:3.1.23-1:*:i386:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B0238C23-FDB9-4E7B-980C-39AA99AC81F0"
},
{
"criteria": "cpe:2.3:a:redhat:up2date:3.1.23-1:*:i386_gnome:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6B9C6FBD-59FA-4420-B159-48094905668A"
}
],
"operator": "OR"
}
]
}
]