CVE-2014-6273

Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://secunia.com/advisories/61605 - () http://secunia.com/advisories/61605 -
References () http://secunia.com/advisories/61710 - () http://secunia.com/advisories/61710 -
References () http://www.debian.org/security/2014/dsa-3031 - Vendor Advisory () http://www.debian.org/security/2014/dsa-3031 - Vendor Advisory
References () http://www.securityfocus.com/bid/70075 - () http://www.securityfocus.com/bid/70075 -
References () http://www.ubuntu.com/usn/USN-2353-1 - Patch, Vendor Advisory () http://www.ubuntu.com/usn/USN-2353-1 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/96151 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/96151 -

Information

Published : 2014-09-30 14:55

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6273

Mitre link : CVE-2014-6273

CVE.ORG link : CVE-2014-6273


JSON object : View

Products Affected

debian

  • advanced_package_tool
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer