All the vulnerabilites related to opensuse - libzypp
Vulnerability from fkie_nvd
Published
2018-08-31 15:29
Modified
2024-11-21 04:12
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "8886DF2E-FD7C-48A4-8160-526BA91D6D9C", "versionEndExcluding": "17.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download." }, { "lang": "es", "value": "Los pasos de descarga e instalaci\u00f3n desacoplados en libzypp en versiones anteriores a la 17.5.0 podr\u00eda conducir a que un RPM corrupto se deje en la cach\u00e9, en la que una llamada posterior no mostrar\u00eda el aviso de RPM corrupto y permite la instalaci\u00f3n. Este problema est\u00e1 provocado por avisos maliciosos que solo se muestran durante la descarga." } ], "id": "CVE-2018-7685", "lastModified": "2024-11-21T04:12:32.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-31T15:29:00.253", "references": [ { "source": "security@opentext.com", "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" }, { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "source": "security@opentext.com", "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-01 20:29
Modified
2024-11-21 03:31
Severity ?
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CAACEA3-7214-40A7-B212-DE6BED99F2C7", "versionEndIncluding": "16.15.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." }, { "lang": "es", "value": "En libzypp, en versiones anteriores a la 20170803, fue posible a\u00f1adir repositorios YUM no firmados sin avisar al usuario. Esto pod\u00eda resultar en que un atacante Man-in-the-Middle (MitM) o servidores maliciosos inyectasen paquetes RPM maliciosos en el sistema de un usuario." } ], "id": "CVE-2017-7435", "lastModified": "2024-11-21T03:31:53.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-01T20:29:00.617", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" }, { "source": "security@opentext.com", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "security@opentext.com", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-01 20:29
Modified
2024-11-21 03:35
Severity ?
7.7 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA09C23E-91B3-4E29-91B2-F517F293488C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content." }, { "lang": "es", "value": "En libzypp, en versiones anteriores a agosto de 2018, las claves GPG adjuntadas en repositorios YUM no se anclaban correctamente, lo que permit\u00eda que mirrors de repositorio maliciosos degradasen silenciosamente a repositorios no firmados con contenido potencialmente malicioso." } ], "id": "CVE-2017-9269", "lastModified": "2024-11-21T03:35:43.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.5, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-01T20:29:00.820", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "source": "security@opentext.com", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "security@opentext.com", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-757" } ], "source": "security@opentext.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-01 20:29
Modified
2024-11-21 03:31
Severity ?
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CAACEA3-7214-40A7-B212-DE6BED99F2C7", "versionEndIncluding": "16.15.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." }, { "lang": "es", "value": "En libzypp, en versiones anteriores a la 20170803, fue posible recuperar paquetes no firmados sin avisar al usuario. Esto pod\u00eda resultar en que un atacante Man-in-the-Middle (MitM) o servidores maliciosos inyectasen paquetes RPM maliciosos en el sistema de un usuario." } ], "id": "CVE-2017-7436", "lastModified": "2024-11-21T03:31:53.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security@opentext.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-01T20:29:00.693", "references": [ { "source": "security@opentext.com", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "source": "security@opentext.com", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "security@opentext.com", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ], "sourceIdentifier": "security@opentext.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-24 16:15
Modified
2024-11-21 04:33
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
: Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
opensuse | libzypp | * | |
suse | caas_platform | 3.0 | |
opensuse | libzypp | * | |
suse | suse_linux_enterprise_server | 12 | |
opensuse | libzypp | * | |
suse | suse_linux_enterprise_server | 15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "805EF031-0F25-472E-AE1A-008755BD5727", "versionEndExcluding": "16.21.2-27.68.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:caas_platform:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABF09D-B887-4041-9168-5057B668F602", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7A5700D-0E1B-432F-B50D-59C4AB297BDE", "versionEndExcluding": "16.21.2-2.45.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "matchCriteriaId": "9C649194-B8C2-49F7-A819-C635EE584ABF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*", "matchCriteriaId": "E29CF9A9-8160-4DAA-9B87-D82385C11B23", "versionEndExcluding": "17.19.0-3.34.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*", "matchCriteriaId": "AF73A3D9-6566-4CBF-AA5F-5A4B99719A1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1." }, { "lang": "es", "value": "Una vulnerabilidad de Permisos Predeterminados Incorrectos en libzypp de SUSE CaaS Platform versi\u00f3n 3.0, SUSE Linux Enterprise Server versi\u00f3n12, SUSE Linux Enterprise Server versi\u00f3n 15, permiti\u00f3 a atacantes locales leer un almac\u00e9n de cookies utilizado por libzypp, exponiendo cookies privadas. Este problema afecta a: libzypp versiones anteriores a 16.21.2-27.68.1 de SUSE CaaS Platform versi\u00f3n 3.0. libzypp versiones anteriores a 16.21.2-2.45.1 de SUSE Linux Enterprise Server versi\u00f3n 12. versi\u00f3n 17.19.0-3.34.1 de SUSE Linux Enterprise Server versi\u00f3n 15." } ], "id": "CVE-2019-18900", "lastModified": "2024-11-21T04:33:48.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "meissner@suse.de", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-24T16:15:10.943", "references": [ { "source": "meissner@suse.de", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" }, { "source": "meissner@suse.de", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1158763" }, { "source": "meissner@suse.de", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1158763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html" } ], "sourceIdentifier": "meissner@suse.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "meissner@suse.de", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2017-9269
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-17 00:36
Severity ?
EPSS score ?
Summary
In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=1045735 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2017-9269/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:43.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "201808", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Moritz Duge and Till Doerges from PRESENSE" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious mirrors could downgrade repositories from trusted signed repositories to unsigned malicious repositories.", "lang": "en", "type": "text" } ] }, { "descriptions": [ { "cweId": "CWE-757", "description": "CWE-757", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:46", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ], "source": { "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1045735" ], "discovery": "EXTERNAL" }, "title": "lack of keypinning in libzypp could lead to repository switching", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-9269", "STATE": "PUBLIC", "TITLE": "lack of keypinning in libzypp could lead to repository switching" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "201808" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Moritz Duge and Till Doerges from PRESENSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious mirrors could downgrade repositories from trusted signed repositories to unsigned malicious repositories." } ] }, { "description": [ { "lang": "eng", "value": "CWE-757" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1045735" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" } ] }, "source": { "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1045735" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-9269", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-05-29T00:00:00", "dateUpdated": "2024-09-17T00:36:56.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7436
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.suse.com/show_bug.cgi?id=1038984 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2017-7436/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "20170803", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Boleslaw Tokarski" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Missing UI interaction when using unsigned packages could lead to use of malicious packages.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:43", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ], "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/1038984" ], "discovery": "INTERNAL" }, "title": "libzypp accepts unsigned packages even when configured to check signatures", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-7436", "STATE": "PUBLIC", "TITLE": "libzypp accepts unsigned packages even when configured to check signatures" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "20170803" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Boleslaw Tokarski" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing UI interaction when using unsigned packages could lead to use of malicious packages." } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1038984", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1038984" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7436/" } ] }, "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/1038984" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-7436", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T19:09:24.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7435
Vulnerability from cvelistv5
Published
2018-03-01 19:00
Modified
2024-09-16 22:14
Severity ?
EPSS score ?
Summary
In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
References
▼ | URL | Tags |
---|---|---|
https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://www.suse.com/de-de/security/cve/CVE-2017-7435/ | x_refsource_CONFIRM | |
https://bugzilla.suse.com/show_bug.cgi?id=1009127 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "20170803", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ludwig Nussel of SUSE" } ], "datePublic": "2017-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Missing UI interaction when adding untrusted repositories could lead to use of unsigned package repositories.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:16:05", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "name": "SUSE-SU-2017:2040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ], "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1009127" ], "discovery": "INTERNAL" }, "title": "libzypp accepts unsigned 3rd party repo without warning", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-7435", "STATE": "PUBLIC", "TITLE": "libzypp accepts unsigned 3rd party repo without warning" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "20170803" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Ludwig Nussel of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing UI interaction when adding untrusted repositories could lead to use of unsigned package repositories." } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2017:2040", "refsource": "SUSE", "url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/", "refsource": "CONFIRM", "url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1009127", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127" } ] }, "source": { "advisory": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html", "defect": [ "https://bugzilla.suse.com/show_bug.cgi?id=1009127" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-7435", "datePublished": "2018-03-01T19:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T22:14:57.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18900
Vulnerability from cvelistv5
Published
2020-01-24 15:15
Modified
2024-09-16 20:52
Severity ?
EPSS score ?
Summary
: Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1158763 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | SUSE | CaaS Platform 3.0 |
Version: libzypp < 16.21.2-27.68.1 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1158763" }, { "name": "openSUSE-SU-2020:0255", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" }, { "name": "[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CaaS Platform 3.0", "vendor": "SUSE", "versions": [ { "lessThan": "16.21.2-27.68.1", "status": "affected", "version": "libzypp", "versionType": "custom" } ] }, { "product": "SUSE Linux Enterprise Server 12", "vendor": "SUSE", "versions": [ { "lessThan": "16.21.2-2.45.1", "status": "affected", "version": "libzypp", "versionType": "custom" } ] }, { "product": "SUSE Linux Enterprise Server 15", "vendor": "SUSE", "versions": [ { "status": "affected", "version": "libzypp 17.19.0-3.34.1" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Gerstner of SUSE" } ], "datePublic": "2020-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": ": Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276: Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-04T04:05:59", "orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1158763" }, { "name": "openSUSE-SU-2020:0255", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" }, { "name": "[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html" } ], "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1158763", "defect": [ "1158763" ], "discovery": "INTERNAL" }, "title": "libzypp stores cookies world readable", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2020-01-24T00:00:00.000Z", "ID": "CVE-2019-18900", "STATE": "PUBLIC", "TITLE": "libzypp stores cookies world readable" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CaaS Platform 3.0", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "libzypp", "version_value": "16.21.2-27.68.1" } ] } }, { "product_name": "SUSE Linux Enterprise Server 12", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "libzypp", "version_value": "16.21.2-2.45.1" } ] } }, { "product_name": "SUSE Linux Enterprise Server 15", "version": { "version_data": [ { "version_name": "libzypp", "version_value": "17.19.0-3.34.1" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Gerstner of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": ": Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-276: Incorrect Default Permissions" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1158763", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1158763" }, { "name": "openSUSE-SU-2020:0255", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" }, { "name": "[debian-lts-announce] 20200304 [SECURITY] [DLA 2132-1] libzypp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00005.html" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1158763", "defect": [ "1158763" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "assignerShortName": "suse", "cveId": "CVE-2019-18900", "datePublished": "2020-01-24T15:15:15.806052Z", "dateReserved": "2019-11-12T00:00:00", "dateUpdated": "2024-09-16T20:52:26.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7685
Vulnerability from cvelistv5
Published
2018-08-31 15:00
Modified
2024-09-17 00:52
Severity ?
EPSS score ?
Summary
The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1091624 | x_refsource_CONFIRM | |
https://www.suse.com/de-de/security/cve/CVE-2018-7685/ | x_refsource_MISC | |
http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:05.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libzypp", "vendor": "SUSE", "versions": [ { "lessThan": "17.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:16:08", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ], "source": { "defect": [ "1091624" ], "discovery": "EXTERNAL" }, "title": "libzypp does not reevaluate malicious rpms once downloaded", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-08-30T00:00:00.000Z", "ID": "CVE-2018-7685", "STATE": "PUBLIC", "TITLE": "libzypp does not reevaluate malicious rpms once downloaded" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libzypp", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "17.5.0" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1091624", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1091624" }, { "name": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/", "refsource": "MISC", "url": "https://www.suse.com/de-de/security/cve/CVE-2018-7685/" }, { "name": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html", "refsource": "MISC", "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" } ] }, "source": { "defect": [ "1091624" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2018-7685", "datePublished": "2018-08-31T15:00:00Z", "dateReserved": "2018-03-05T00:00:00", "dateUpdated": "2024-09-17T00:52:15.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }