Summary
Detail | |||
---|---|---|---|
Vendor | Debian | First view | 2011-07-26 |
Product | Advanced Package Tool | Last view | 2020-12-10 |
Version | 0.8.14.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:debian:advanced_package_tool |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
2.8 | 2020-12-10 | CVE-2020-27351 | Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 versions prior to 1.6.5ubuntu0.4; 2.0.0ubuntu0 versions prior to 2.0.0ubuntu0.20.04.2; 2.1.3ubuntu1 versions prior to 2.1.3ubuntu1.1; |
5.7 | 2020-12-10 | CVE-2020-27350 | APT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. This issue affects: apt 1.2.32ubuntu0 versions prior to 1.2.32ubuntu0.2; 1.6.12ubuntu0 versions prior to 1.6.12ubuntu0.2; 2.0.2ubuntu0 versions prior to 2.0.2ubuntu0.2; 2.1.10ubuntu0 versions prior to 2.1.10ubuntu0.1; |
8.1 | 2019-01-28 | CVE-2019-3462 | Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine. |
5.9 | 2018-08-20 | CVE-2018-0501 | The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail. |
5.9 | 2017-12-05 | CVE-2016-1252 | The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures. |
7.5 | 2014-11-03 | CVE-2014-0490 | The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package. |
3.6 | 2014-10-15 | CVE-2014-7206 | The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file. |
6.8 | 2014-09-30 | CVE-2014-6273 | Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL. |
4 | 2014-06-17 | CVE-2014-0478 | APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature. |
2.6 | 2012-06-19 | CVE-2012-3587 | APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack. |
2.6 | 2012-06-19 | CVE-2012-0954 | APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587. |
4.3 | 2011-07-26 | CVE-2011-1829 | APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
45% (5) | CWE-20 | Improper Input Validation |
9% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
9% (1) | CWE-347 | Improper Verification of Cryptographic Signature |
9% (1) | CWE-295 | Certificate Issues |
9% (1) | CWE-190 | Integer Overflow or Wraparound |
9% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
74263 | APT Inline GPG Signatures Verification Weakness |
OpenVAS Exploits
id | Description |
---|---|
2012-06-19 | Name : Ubuntu Update for apt USN-1477-1 File : nvt/gb_ubuntu_USN_1477_1.nasl |
2012-06-15 | Name : Ubuntu Update for apt USN-1475-1 File : nvt/gb_ubuntu_USN_1475_1.nasl |
2011-07-18 | Name : Ubuntu Update for apt USN-1169-1 File : nvt/gb_ubuntu_USN_1169_1.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-07-02 | Debian apt remote code execution attempt RuleID : 50190 - Type : OS-LINUX - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-12-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3733.nasl - Type: ACT_GATHER_INFO |
2016-12-14 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3156-1.nasl - Type: ACT_GATHER_INFO |
2014-10-09 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3048.nasl - Type: ACT_GATHER_INFO |
2014-10-09 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2370-1.nasl - Type: ACT_GATHER_INFO |
2014-09-25 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3031.nasl - Type: ACT_GATHER_INFO |
2014-09-24 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2353-1.nasl - Type: ACT_GATHER_INFO |
2014-09-17 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3025.nasl - Type: ACT_GATHER_INFO |
2014-09-17 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2348-1.nasl - Type: ACT_GATHER_INFO |
2014-06-18 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2246-1.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2958.nasl - Type: ACT_GATHER_INFO |
2012-06-18 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-1477-1.nasl - Type: ACT_GATHER_INFO |
2011-07-14 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-1169-1.nasl - Type: ACT_GATHER_INFO |