CVE-2021-20271
Published Mar 26, 2021
Last updated 2 years ago
Overview
- Description
- A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5017E785-D9A4-40BE-ADD8-4421BB138131", "versionEndExcluding": "4.15.1.3", "versionStartIncluding": "4.15.0" }, { "criteria": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F22989FC-E9C0-4189-BDFE-69346C3F8495", "versionEndExcluding": "4.16.1.3", "versionStartIncluding": "4.16.0" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.15.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E77F834-98D9-45CA-A442-97362CEAB09C" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.15.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40503D12-35BC-4515-A293-F39A37B23A38" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.15.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19299515-DF82-48A3-BA65-0DE705E75CA5" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.16.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0565E985-6BD3-45E1-928C-B67E18B7B56E" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.16.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96BDFF27-D2ED-48F9-91FB-377D1244A0A0" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.16.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA51C420-EFCB-4068-A981-E99722C5FAD7" }, { "criteria": "cpe:2.3:a:rpm:rpm:4.16.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "653B69E5-0E47-49EF-AD3D-218C86252E7C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14398:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2561CD5F-82A9-464E-B571-44634187B497" } ], "operator": "OR" } ] } ]