[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4371-1 apt -- apt

ID: oval:org.secpod.oval:def:603611Date: (C)2019-01-25   (M)2023-12-20
Class: PATCHFamily: unix




Max Justicz discovered a vulnerability in APT, the high level package manager. The code handling HTTP redirects in the HTTP transport method doesn"t properly sanitize fields transmitted over the wire. This vulnerability could be used by an attacker located as a man-in-the-middle between APT and a mirror to inject malicous content in the HTTP connection. This content could then be recognized as a valid package by APT and used later for code execution with root privileges on the target machine. Since the vulnerability is present in the package manager itself, it is recommended to disable redirects in order to prevent exploitation during this upgrade only, using: apt -o Acquire::http::AllowRedirect=false update apt -o Acquire::http::AllowRedirect=false upgrade This is known to break some proxies when used against security.debian.org

Platform:
Debian 9.x
Product:
libapt-pkg-dev
libapt-inst2.0
libapt-pkg5.0
libapt-pkg-doc
apt
Reference:
DSA-4371-1
CVE-2019-3462
CVE    1
CVE-2019-3462
CPE    4
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:9.x
cpe:/a:apt:apt
cpe:/o:debian:debian_linux:8.0
...

© SecPod Technologies