Lucene search

K
cve[email protected]CVE-2019-15795
HistoryMar 26, 2020 - 1:15 p.m.

CVE-2019-15795

2020-03-2613:15:12
CWE-327
web.nvd.nist.gov
63
python
apt
security
vulnerability
cve-2019-15795
md5
package validation
man-in-the-middle
nvd

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.1%

python-apt only checks the MD5 sums of downloaded files in Version.fetch_binary() and Version.fetch_source() of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

Affected configurations

NVD
Node
canonicalubuntu_linuxMatch12.04esm
AND
ubuntupython-aptMatch0.8.0ubuntu9
OR
ubuntupython-aptMatch0.8.1ubuntu1
OR
ubuntupython-aptMatch0.8.3ubuntu1
OR
ubuntupython-aptMatch0.8.3ubuntu2
OR
ubuntupython-aptMatch0.8.3ubuntu3
OR
ubuntupython-aptMatch0.8.3ubuntu4
OR
ubuntupython-aptMatch0.8.3ubuntu5
OR
ubuntupython-aptMatch0.8.3ubuntu6
OR
ubuntupython-aptMatch0.8.3ubuntu7
OR
ubuntupython-aptMatch0.8.3ubuntu7.1
OR
ubuntupython-aptMatch0.8.3ubuntu7.2
OR
ubuntupython-aptMatch0.8.3ubuntu7.3
Node
canonicalubuntu_linuxMatch14.04esm
AND
ubuntupython-aptMatch0.8.9.1
OR
ubuntupython-aptMatch0.8.9.1ubuntu1
OR
ubuntupython-aptMatch0.9.0
OR
ubuntupython-aptMatch0.9.1
OR
ubuntupython-aptMatch0.9.1build1
OR
ubuntupython-aptMatch0.9.1build2
OR
ubuntupython-aptMatch0.9.1ubuntu1
OR
ubuntupython-aptMatch0.9.3.1
OR
ubuntupython-aptMatch0.9.3.2
OR
ubuntupython-aptMatch0.9.3.2ubuntu1
OR
ubuntupython-aptMatch0.9.3.2ubuntu2
OR
ubuntupython-aptMatch0.9.3.3
OR
ubuntupython-aptMatch0.9.3.3ubuntu1
OR
ubuntupython-aptMatch0.9.3.4
OR
ubuntupython-aptMatch0.9.3.4build1
OR
ubuntupython-aptMatch0.9.3.5
OR
ubuntupython-aptMatch0.9.3.5ubuntu1
OR
ubuntupython-aptMatch0.9.3.5ubuntu2
OR
ubuntupython-aptMatch0.9.3.5ubuntu3
Node
canonicalubuntu_linuxMatch16.04lts
AND
ubuntupython-aptMatch1.0.1build1
OR
ubuntupython-aptMatch1.0.1ubuntu1
OR
ubuntupython-aptMatch1.0.1ubuntu2
OR
ubuntupython-aptMatch1.1.0beta1
OR
ubuntupython-aptMatch1.1.0beta1build1
OR
ubuntupython-aptMatch1.1.0beta1ubuntu0.16.04.1
OR
ubuntupython-aptMatch1.1.0beta1ubuntu0.16.04.2
OR
ubuntupython-aptMatch1.1.0beta1ubuntu0.16.04.3
OR
ubuntupython-aptMatch1.1.0beta1ubuntu0.16.04.4
OR
ubuntupython-aptMatch1.1.0beta1ubuntu0.16.04.5
Node
canonicalubuntu_linuxMatch18.04lts
AND
debianpython-aptMatch1.8.4
OR
ubuntupython-aptMatch1.4.0
OR
ubuntupython-aptMatch1.4.0beta3build2
OR
ubuntupython-aptMatch1.4.0beta3ubuntu1
OR
ubuntupython-aptMatch1.6.0
OR
ubuntupython-aptMatch1.6.0rc1
OR
ubuntupython-aptMatch1.6.0rc2ubuntu1
OR
ubuntupython-aptMatch1.6.0rc2ubuntu2
OR
ubuntupython-aptMatch1.6.0rc3
OR
ubuntupython-aptMatch1.6.1
OR
ubuntupython-aptMatch1.6.2
OR
ubuntupython-aptMatch1.6.3
OR
ubuntupython-aptMatch1.6.3ubuntu1
OR
ubuntupython-aptMatch1.6.4
OR
ubuntupython-aptMatch1.8.4
Node
canonicalubuntu_linuxMatch19.10
AND
ubuntupython-aptMatch1.8.4
OR
ubuntupython-aptMatch1.9.0alpha0\~ubuntu1
OR
ubuntupython-aptMatch1.9.0alpha0\~ubuntu2
OR
ubuntupython-aptMatch1.9.0ubuntu1
Node
canonicalubuntu_linuxMatch19.04
AND
ubuntupython-aptMatch1.7.0
OR
ubuntupython-aptMatch1.8.0
OR
ubuntupython-aptMatch1.8.0alpha0\~ubuntu1
OR
ubuntupython-aptMatch1.8.0alpha0\~ubuntu2
OR
ubuntupython-aptMatch1.8.1
OR
ubuntupython-aptMatch1.8.2
OR
ubuntupython-aptMatch1.8.3
OR
ubuntupython-aptMatch1.8.4

CNA Affected

[
  {
    "product": "Python-apt",
    "vendor": "Canonical",
    "versions": [
      {
        "lessThan": "0.8.3ubuntu7.5",
        "status": "affected",
        "version": "0.8.3",
        "versionType": "custom"
      },
      {
        "lessThan": "0.9.3.5ubuntu3+esm2",
        "status": "affected",
        "version": "0.9.3.5",
        "versionType": "custom"
      },
      {
        "lessThan": "1.1.0~beta1ubuntu0.16.04.7",
        "status": "affected",
        "version": "1.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "1.6.5ubuntu0.1",
        "status": "affected",
        "version": "1.6.5",
        "versionType": "custom"
      },
      {
        "lessThan": "1.9.0ubuntu1.2",
        "status": "affected",
        "version": "1.9.0",
        "versionType": "custom"
      }
    ]
  }
]

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.1%