[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-1829Date: (C)2011-07-26   (M)2023-12-22


APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-48671
USN-1169-1
apt-gpg-security-bypass(68560)
http://launchpadlibrarian.net/75126628/apt_0.8.13.2ubuntu2_0.8.13.2ubuntu4.1.diff.gz
http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog
https://launchpad.net/bugs/784473
https://launchpad.net/ubuntu/+archive/primary/+sourcepub/1817196/+listing-archive-extra

CPE    1
cpe:/o:canonical:ubuntu_linux:11.04
CWE    1
CWE-20
OVAL    1
oval:org.secpod.oval:def:700551

© SecPod Technologies