This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Debian First view 2009-04-21
Product Apt Last view 2020-05-15
Version 0.1 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:debian:apt

Activity : Overall

Related : CVE

  Date Alert Description
5.5 2020-05-15 CVE-2020-3810

Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.

10 2009-04-21 CVE-2009-1358

apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick apt into installing malicious repositories.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-125 Out-of-bounds Read
50% (1) CWE-20 Improper Input Validation

Open Source Vulnerability Database (OSVDB)

id Description
56289 apt apt-get gpgv Package Signature Verification Weakness

OpenVAS Exploits

id Description
2009-05-05 Name : Debian Security Advisory DSA 1779-1 (apt)
File : nvt/deb_1779_1.nasl

Nessus® Vulnerability Scanner

id Description
2009-04-27 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1779.nasl - Type: ACT_GATHER_INFO