This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Debian First view 2014-06-17
Product Advanced Package Tool Last view 2020-12-10
Version 0.9.14.2 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:debian:advanced_package_tool

Activity : Overall

Related : CVE

  Date Alert Description
2.8 2020-12-10 CVE-2020-27351

Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 versions prior to 1.6.5ubuntu0.4; 2.0.0ubuntu0 versions prior to 2.0.0ubuntu0.20.04.2; 2.1.3ubuntu1 versions prior to 2.1.3ubuntu1.1;

5.7 2020-12-10 CVE-2020-27350

APT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. This issue affects: apt 1.2.32ubuntu0 versions prior to 1.2.32ubuntu0.2; 1.6.12ubuntu0 versions prior to 1.6.12ubuntu0.2; 2.0.2ubuntu0 versions prior to 2.0.2ubuntu0.2; 2.1.10ubuntu0 versions prior to 2.1.10ubuntu0.1;

8.1 2019-01-28 CVE-2019-3462

Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.

5.9 2018-08-20 CVE-2018-0501

The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.

5.9 2017-12-05 CVE-2016-1252

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

7.5 2014-11-03 CVE-2014-0490

The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.

3.6 2014-10-15 CVE-2014-7206

The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.

6.8 2014-09-30 CVE-2014-6273

Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.

4 2014-06-17 CVE-2014-0478

APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.

CWE : Common Weakness Enumeration

%idName
25% (2) CWE-20 Improper Input Validation
12% (1) CWE-772 Missing Release of Resource after Effective Lifetime
12% (1) CWE-347 Improper Verification of Cryptographic Signature
12% (1) CWE-295 Certificate Issues
12% (1) CWE-190 Integer Overflow or Wraparound
12% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
12% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')

Snort® IPS/IDS

Date Description
2019-07-02 Debian apt remote code execution attempt
RuleID : 50190 - Type : OS-LINUX - Revision : 1

Nessus® Vulnerability Scanner

id Description
2016-12-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3733.nasl - Type: ACT_GATHER_INFO
2016-12-14 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3156-1.nasl - Type: ACT_GATHER_INFO
2014-10-09 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3048.nasl - Type: ACT_GATHER_INFO
2014-10-09 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2370-1.nasl - Type: ACT_GATHER_INFO
2014-09-25 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3031.nasl - Type: ACT_GATHER_INFO
2014-09-24 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2353-1.nasl - Type: ACT_GATHER_INFO
2014-09-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3025.nasl - Type: ACT_GATHER_INFO
2014-09-17 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2348-1.nasl - Type: ACT_GATHER_INFO
2014-06-18 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2246-1.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2958.nasl - Type: ACT_GATHER_INFO