APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2012/Jun/267 - | |
References | () http://seclists.org/fulldisclosure/2012/Jun/271 - | |
References | () http://seclists.org/fulldisclosure/2012/Jun/289 - | |
References | () http://www.securityfocus.com/bid/54046 - | |
References | () http://www.ubuntu.com/usn/USN-1475-1 - | |
References | () http://www.ubuntu.com/usn/USN-1477-1 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013639 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013681 - |
Information
Published : 2012-06-19 20:55
Updated : 2024-11-21 01:36
NVD link : CVE-2012-0954
Mitre link : CVE-2012-0954
CVE.ORG link : CVE-2012-0954
JSON object : View
Products Affected
debian
- advanced_package_tool
CWE
CWE-20
Improper Input Validation