CVE-2017-7500

ADVISORY - nist

Summary

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.

EPSS Score: 0.00054 (0.170)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Link Resolution Before File Access ('Link Following')

ADVISORY - redhat

Improper Link Resolution Before File Access ('Link Following')


NIST

CREATED

UPDATED

ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE

1.3

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

7.3high

Debian

CREATED

UPDATED

ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Ubuntu

CREATED

UPDATED

ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE

1.8

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

7.8low

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2017-7500
EXPLOITABILITY SCORE

1.3

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

7.3medium

Photon

CREATED

UPDATED

ADVISORY ID

CVE-2017-7500

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

7.8high