Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3521

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-3521

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Enterprise Linux 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Enterprise Linux是美国红帽(Red Hat)公司的面向企业用户的Linux操作系统 Red Hat Enterprise Linux 存在数据伪造问题漏洞,该漏洞源于RPM的签名功能出现了错误。RPM在导入子项时,没有检查绑定签名。能够将恶意子密钥添加到合法公钥的远程攻击者可利用该漏洞可以在系统上运行恶意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-RPM Fixed in rpm-4.18.0-beta1, rpm-4.18.0-alpha2, rpm-4.18.0-alpha1 . -

II. Public POCs for CVE-2021-3521

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-3521

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-22 · 22 CVEs total

CVE-2022-37133D-Link DIR-816 安全漏洞
CVE-2022-35191D-Link AC1200 安全漏洞
CVE-2022-38667Crow 资源管理错误漏洞
CVE-2022-38668Crow 信息泄露漏洞
CVE-2022-38171XPDF 输入验证错误漏洞
CVE-2022-35150BaijiaCMS 代码问题漏洞
CVE-2021-3659Linux kernel 代码问题漏洞
CVE-2021-3639mod_auth_mellon 输入验证错误漏洞
CVE-2021-3590Foreman 安全漏洞
CVE-2021-3586Red Hat OpenShift Service Mesh 安全特征问题漏洞
CVE-2021-3513Red Hat Keycloak 安全漏洞
CVE-2021-3481Libqt 缓冲区错误漏洞
CVE-2021-3442Red Hat 3scale API Management Platform 输入验证错误漏洞
CVE-2020-27836Red Hat OpenShift cluster-ingress-operator 安全漏洞
CVE-2022-37134D-Link DIR-816 安全漏洞
CVE-2021-37289PLANEX Chibi Fai 3 安全漏洞
CVE-2022-36251Clinic’s Patient Management System 跨站脚本漏洞
CVE-2022-36198Bus Pass Management System SQL注入漏洞
CVE-2022-35583wkhtmltopdf 代码问题漏洞
CVE-2022-2873Linux kernel 安全漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-3521

No comments yet


Leave a comment