Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
References
Configurations
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/61605 - | |
References | () http://secunia.com/advisories/61710 - | |
References | () http://www.debian.org/security/2014/dsa-3031 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/70075 - | |
References | () http://www.ubuntu.com/usn/USN-2353-1 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/96151 - |
Information
Published : 2014-09-30 14:55
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6273
Mitre link : CVE-2014-6273
CVE.ORG link : CVE-2014-6273
JSON object : View
Products Affected
debian
- advanced_package_tool
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer