Executive Summary
Summary | |
---|---|
Title | New apt packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1779 | First vendor Publication | 2009-04-26 |
Vendor | Debian | Last vendor Modification | 2009-04-26 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Two vulnerabilities have been discovered in APT, the well-known dpkg frontend. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1300 In time zones where daylight savings time occurs at midnight, the apt cron.daily script fails, stopping new security updates from being applied automatically. CVE-2009-1358 A repository that has been signed with an expired or revoked OpenPGP key would still be considered valid by APT. For the old stable distribution (etch), these problems have been fixed in version 0.6.46.4-0.1+etch1. For the stable distribution (lenny), these problems have been fixed in version 0.7.20.2+lenny1. For the unstable distribution (sid), these problems have been fixed in version 0.7.21. We recommend that you upgrade your apt package. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1779 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13616 | |||
Oval ID: | oval:org.mitre.oval:def:13616 | ||
Title: | DSA-1779-1 apt -- several | ||
Description: | Two vulnerabilities have been discovered in APT, the well-known dpkg frontend. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1300 In time zones where daylight savings time occurs at midnight, the apt cron.daily script fails, stopping new security updates from being applied automatically. CVE-2009-1358 A repository that has been signed with an expired or revoked OpenPGP key would still be considered valid by APT. For the old stable distribution, these problems have been fixed in version 0.6.46.4-0.1+etch1. For the stable distribution, these problems have been fixed in version 0.7.20.2+lenny1. For the unstable distribution, these problems have been fixed in version 0.7.21. We recommend that you upgrade your apt package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1779-1 CVE-2009-1300 CVE-2009-1358 | Version: | 7 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | apt |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13689 | |||
Oval ID: | oval:org.mitre.oval:def:13689 | ||
Title: | USN-762-1 -- apt vulnerabilities | ||
Description: | Alexandre Martani discovered that the APT daily cron script did not check the return code of the date command. If a machine is configured for automatic updates and is in a time zone where DST occurs at midnight, under certain circumstances automatic updates might not be applied and could become permanently disabled. Michael Casadevall discovered that APT did not properly verify repositories signed with a revoked or expired key. If a repository were signed with only an expired or revoked key and the signature was otherwise valid, APT would consider the repository valid | ||
Family: | unix | Class: | patch |
Reference(s): | USN-762-1 CVE-2009-1300 | Version: | 7 |
Platform(s): | Ubuntu 8.04 Ubuntu 6.06 Ubuntu 8.10 | Product(s): | apt |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8263 | |||
Oval ID: | oval:org.mitre.oval:def:8263 | ||
Title: | DSA-1779 apt -- several vulnerabilities | ||
Description: | Two vulnerabilities have been discovered in APT, the well-known dpkg frontend. The Common Vulnerabilities and Exposures project identifies the following problems: In time zones where daylight savings time occurs at midnight, the apt cron.daily script fails, stopping new security updates from being applied automatically. A repository that has been signed with an expired or revoked OpenPGP key would still be considered valid by APT. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1779 CVE-2009-1300 CVE-2009-1358 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | apt |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : Debian Security Advisory DSA 1779-1 (apt) File : nvt/deb_1779_1.nasl |
2009-04-28 | Name : Ubuntu USN-761-1 (php5) File : nvt/ubuntu_761_1.nasl |
2009-04-28 | Name : Ubuntu USN-762-1 (apt) File : nvt/ubuntu_762_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
56433 | apt date Command Invalid Date Handling Weakness |
56289 | apt apt-get gpgv Package Signature Verification Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1779.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-762-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:25 |
|