Subject: [ASA-201707-24] rkhunter: arbitrary code execution Arch Linux Security Advisory ASA-201707-24 ========================================== Severity: High Date : 2017-07-18 CVE-ID : CVE-2017-7480 Package : rkhunter Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-334 Summary ======= The package rkhunter before version 1.4.4-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 1.4.4-1. # pacman -Syu "rkhunter>=1.4.4-1" The problem has been fixed upstream in version 1.4.4. Workaround ========== None. Description =========== rkhunter downloads updates over a plain HTTP link with a version certificate that can be faked. A potential man-in-the-middle attack can lead to the execution of arbitrary code. Impact ====== A remote attacker in position of man-in-the-middle is able to execute arbitrary code by injecting a malicious update. References ========== http://openwall.com/lists/oss-security/2017/06/29/2 https://security.archlinux.org/CVE-2017-7480