CVE-2002-2204

Severity

75%

Complexity

99%

Confidentiality

106%

A large degree of social engineering and user interaction is neccessary to exploit this vulnerbility.

The default --checksig setting in RPM Package Manager 4.0.4 checks that a package's signature is valid without listing who signed it, which can allow remote attackers to make it appear that a malicious package comes from a trusted source.

A large degree of social engineering and user interaction is neccessary to exploit this vulnerbility.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Red Hat RPM

First reported 22 years ago

2002-12-31 05:00:00

Last updated 16 years ago

2008-09-05 20:32:00

Affected Software

Red Hat RPM 4.0.2_7.1

4.0.2-71

Red Hat RPM 4.0.2_7.2

4.0.2-72

Red Hat RPM 4.0.3

4.0.3

Red Hat RPM 4.0.4

4.0.4

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.