Lucene search

K
debianDebianDEBIAN:D07C588BEF52F39583BC74030AED6E09:22D9B
HistoryJun 12, 2014 - 6:15 p.m.

apt security update

2014-06-1218:15:29
lists.debian.org
26

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

EPSS

0.001

Percentile

44.3%

Package : apt
Version : 0.8.10.3+squeeze2
CVE ID : CVE-2011-3634 CVE-2014-0478
Debian Bug : 749795

Jakub Wilk discovered that APT, the high level package manager,
did not properly perform authentication checks for source packages
downloaded via "apt-get source". This only affects use cases where
source packages are downloaded via this command; it does not
affect regular Debian package installation and upgrading.
(CVE-2014-0478)

It was discovered that APT incorrectly handled the Verify-Host
configuration option. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could potentially be used to steal
repository credentials. This only relevant for systems that use APT
sources on https connections (requires the apt-transport-https package
to be installed). (CVE-2011-3634)
Attachment:
signature.asc
Description: This is a digitally signed message part.

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

EPSS

0.001

Percentile

44.3%