[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2011-1829Date: (C)2011-07-26   (M)2018-02-19


APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 4.3
Exploit Score: Exploit Score: 8.6
Impact Score: Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: NONE
Scope: Integrity: PARTIAL
Confidentiality: Availability: NONE
Integrity:  
Availability:  
  
Reference:
BID-48671
USN-1169-1
apt-gpg-security-bypass(68560)
http://launchpadlibrarian.net/75126628/apt_0.8.13.2ubuntu2_0.8.13.2ubuntu4.1.diff.gz
http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog
https://launchpad.net/bugs/784473
https://launchpad.net/ubuntu/+archive/primary/+sourcepub/1817196/+listing-archive-extra

CPE    56
cpe:/a:debian:apt:0.7.15:exp2
cpe:/a:debian:apt:0.7.15:exp3
cpe:/a:debian:apt:0.7.15:exp1
cpe:/a:debian:apt:0.7.17:exp4
...
CWE    1
CWE-20
OVAL    1
oval:org.secpod.oval:def:700551

© SecPod Technologies