Executive Summary

Summary
Title APT vulnerabilities
Informations
Name USN-762-1 First vendor Publication 2009-04-20
Vendor Ubuntu Last vendor Modification 2009-04-20
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS:
apt 0.6.43.3ubuntu3.1

Ubuntu 8.04 LTS:
apt 0.7.9ubuntu17.2

Ubuntu 8.10:
apt 0.7.14ubuntu6.1

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Alexandre Martani discovered that the APT daily cron script did not check the return code of the date command. If a machine is configured for automatic updates and is in a time zone where DST occurs at midnight, under certain circumstances automatic updates might not be applied and could become permanently disabled. (CVE-2009-1300)

Michael Casadevall discovered that APT did not properly verify repositories signed with a revoked or expired key. If a repository were signed with only an expired or revoked key and the signature was otherwise valid, APT would consider the repository valid. (https://launchpad.net/bugs/356012)

Original Source

Url : http://www.ubuntu.com/usn/USN-762-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13616
 
Oval ID: oval:org.mitre.oval:def:13616
Title: DSA-1779-1 apt -- several
Description: Two vulnerabilities have been discovered in APT, the well-known dpkg frontend. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1300 In time zones where daylight savings time occurs at midnight, the apt cron.daily script fails, stopping new security updates from being applied automatically. CVE-2009-1358 A repository that has been signed with an expired or revoked OpenPGP key would still be considered valid by APT. For the old stable distribution, these problems have been fixed in version 0.6.46.4-0.1+etch1. For the stable distribution, these problems have been fixed in version 0.7.20.2+lenny1. For the unstable distribution, these problems have been fixed in version 0.7.21. We recommend that you upgrade your apt package.
Family: unix Class: patch
Reference(s): DSA-1779-1
CVE-2009-1300
CVE-2009-1358
Version: 7
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 4.0
Product(s): apt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13689
 
Oval ID: oval:org.mitre.oval:def:13689
Title: USN-762-1 -- apt vulnerabilities
Description: Alexandre Martani discovered that the APT daily cron script did not check the return code of the date command. If a machine is configured for automatic updates and is in a time zone where DST occurs at midnight, under certain circumstances automatic updates might not be applied and could become permanently disabled. Michael Casadevall discovered that APT did not properly verify repositories signed with a revoked or expired key. If a repository were signed with only an expired or revoked key and the signature was otherwise valid, APT would consider the repository valid
Family: unix Class: patch
Reference(s): USN-762-1
CVE-2009-1300
Version: 7
Platform(s): Ubuntu 8.04
Ubuntu 6.06
Ubuntu 8.10
Product(s): apt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8263
 
Oval ID: oval:org.mitre.oval:def:8263
Title: DSA-1779 apt -- several vulnerabilities
Description: Two vulnerabilities have been discovered in APT, the well-known dpkg frontend. The Common Vulnerabilities and Exposures project identifies the following problems: In time zones where daylight savings time occurs at midnight, the apt cron.daily script fails, stopping new security updates from being applied automatically. A repository that has been signed with an expired or revoked OpenPGP key would still be considered valid by APT.
Family: unix Class: patch
Reference(s): DSA-1779
CVE-2009-1300
CVE-2009-1358
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 4.0
Product(s): apt
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26
Application 155

OpenVAS Exploits

Date Description
2009-05-05 Name : Debian Security Advisory DSA 1779-1 (apt)
File : nvt/deb_1779_1.nasl
2009-04-28 Name : Ubuntu USN-761-1 (php5)
File : nvt/ubuntu_761_1.nasl
2009-04-28 Name : Ubuntu USN-762-1 (apt)
File : nvt/ubuntu_762_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
56433 apt date Command Invalid Date Handling Weakness

56289 apt apt-get gpgv Package Signature Verification Weakness

Nessus® Vulnerability Scanner

Date Description
2009-04-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1779.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-762-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:05:53
  • Multiple Updates