CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
39.8%
It was discovered that APT incorrectly handled the Verify-Host
configuration option. If a remote attacker were able to perform a
machine-in-the-middle attack, this flaw could potentially be used to steal
repository credentials. This issue only affected Ubuntu 10.04 LTS and
10.10. (CVE-2011-3634)
USN-1215-1 fixed a vulnerability in APT by disabling the apt-key net-update
option. This update re-enables the option with corrected verification.
Original advisory details:
It was discovered that the apt-key utility incorrectly verified GPG
keys when downloaded via the net-update option. If a remote attacker were
able to perform a machine-in-the-middle attack, this flaw could potentially be
used to install altered packages.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.04 | noarch | apt | < 0.7.9ubuntu17.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | apt-transport-https | < 0.7.9ubuntu17.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | apt-utils | < 0.7.9ubuntu17.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libapt-pkg-dev | < 0.7.9ubuntu17.4 | UNKNOWN |
Ubuntu | 11.04 | noarch | apt | < 0.8.13.2ubuntu4.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | apt-transport-https | < 0.8.13.2ubuntu4.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | apt-utils | < 0.8.13.2ubuntu4.3 | UNKNOWN |
Ubuntu | 11.04 | noarch | libapt-pkg-dev | < 0.8.13.2ubuntu4.3 | UNKNOWN |
Ubuntu | 10.10 | noarch | apt | < 0.8.3ubuntu7.3 | UNKNOWN |
Ubuntu | 10.10 | noarch | apt-transport-https | < 0.8.3ubuntu7.3 | UNKNOWN |