CVE-2012-0954

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.2-0.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.10:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.11:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.12:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.13:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.14:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.15:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp1:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp2:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp3:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.16:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.17:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp1:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp2:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp3:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp4:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.18:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.19:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.20:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.20.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.20.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.21:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.22:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.22.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.22.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.23:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.23.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.7.24:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre1:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre2:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.10:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.10.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.10.3:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11.3:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11.4:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.11.5:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.12:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.13:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.13.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.13.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.14:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.14.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp1:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp2:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp3:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.6:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.7:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.8:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.9:*:*:*:*:*:*:*
cpe:2.3:a:debian:advanced_package_tool:0.8.15.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2012/Jun/267 - () http://seclists.org/fulldisclosure/2012/Jun/267 -
References () http://seclists.org/fulldisclosure/2012/Jun/271 - () http://seclists.org/fulldisclosure/2012/Jun/271 -
References () http://seclists.org/fulldisclosure/2012/Jun/289 - () http://seclists.org/fulldisclosure/2012/Jun/289 -
References () http://www.securityfocus.com/bid/54046 - () http://www.securityfocus.com/bid/54046 -
References () http://www.ubuntu.com/usn/USN-1475-1 - () http://www.ubuntu.com/usn/USN-1475-1 -
References () http://www.ubuntu.com/usn/USN-1477-1 - () http://www.ubuntu.com/usn/USN-1477-1 -
References () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128 - () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128 -
References () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013639 - () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013639 -
References () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013681 - () https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013681 -

Information

Published : 2012-06-19 20:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-0954

Mitre link : CVE-2012-0954

CVE.ORG link : CVE-2012-0954


JSON object : View

Products Affected

debian

  • advanced_package_tool
CWE
CWE-20

Improper Input Validation