CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
72.2%
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | advanced_package_tool | 0.7.0 | cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.1 | cpe:2.3:a:debian:advanced_package_tool:0.7.1:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.2 | cpe:2.3:a:debian:advanced_package_tool:0.7.2:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.2-0.1 | cpe:2.3:a:debian:advanced_package_tool:0.7.2-0.1:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.10 | cpe:2.3:a:debian:advanced_package_tool:0.7.10:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.11 | cpe:2.3:a:debian:advanced_package_tool:0.7.11:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.12 | cpe:2.3:a:debian:advanced_package_tool:0.7.12:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.13 | cpe:2.3:a:debian:advanced_package_tool:0.7.13:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.14 | cpe:2.3:a:debian:advanced_package_tool:0.7.14:*:*:*:*:*:*:* |
debian | advanced_package_tool | 0.7.15 | cpe:2.3:a:debian:advanced_package_tool:0.7.15:*:*:*:*:*:*:* |
seclists.org/fulldisclosure/2012/Jun/267
seclists.org/fulldisclosure/2012/Jun/271
seclists.org/fulldisclosure/2012/Jun/289
www.securityfocus.com/bid/54046
www.ubuntu.com/usn/USN-1475-1
www.ubuntu.com/usn/USN-1477-1
bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128
bugs.launchpad.net/ubuntu/+source/apt/+bug/1013639
bugs.launchpad.net/ubuntu/+source/apt/+bug/1013681