CVE-2017-7500
ADVISORY - nistSummary
It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
EPSS Score: 0.00054 (0.170)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Link Resolution Before File Access ('Link Following')
ADVISORY - redhat
Improper Link Resolution Before File Access ('Link Following')
NIST
CREATED
UPDATED
ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE
1.3
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
7.3highDebian
CREATED
UPDATED
ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AlowUbuntu
CREATED
UPDATED
ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE
1.8
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
7.8lowRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE
1.3
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
7.3mediumPhoton
CREATED
UPDATED
ADVISORY ID
CVE-2017-7500
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-