Vulnerability Details : CVE-2006-5466
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-5466
- cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
- cpe:2.3:a:rpm:package_manager:4.4.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5466
3.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5466
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | AV:N/AC:H/Au:N/C:N/I:N/A:C |
4.9
|
6.9
|
NIST |
Vendor statements for CVE-2006-5466
-
Red Hat 2007-03-14Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213515 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2006-5466
-
http://www.ubuntu.com/usn/usn-378-1
USN-378-1: RPM vulnerability | Ubuntu security notices | UbuntuPatch
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833
212833 – CVE-2006-5466 RPM Crash after listing contents of non-installed packageExploit
-
http://security.gentoo.org/glsa/glsa-200611-08.xml
RPM: Buffer overflow (GLSA 200611-08) — Gentoo security
-
http://www.securityfocus.com/bid/20906
-
http://securitytracker.com/id?1017160
Access Denied
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:200
Mandriva
-
http://www.vupen.com/english/advisories/2006/4350
Site en construction
Jump to