Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Advanced_package_tool
(Debian)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 21 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-12-05 | CVE-2016-1252 | The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures. | Ubuntu_linux, Advanced_package_tool | N/A | ||
2014-10-15 | CVE-2014-7206 | The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file. | Advanced_package_tool, Apt | N/A | ||
2014-09-30 | CVE-2014-6273 | Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL. | Advanced_package_tool | N/A | ||
2014-11-03 | CVE-2014-0490 | The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package. | Advanced_package_tool | N/A | ||
2014-11-03 | CVE-2014-0489 | APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package. | Advanced_package_tool | N/A | ||
2014-11-03 | CVE-2014-0488 | APT before 1.0.9 does not "invalidate repository data" when moving from an unauthenticated to authenticated state, which allows remote attackers to have unspecified impact via crafted repository data. | Advanced_package_tool | N/A | ||
2014-11-03 | CVE-2014-0487 | APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors. | Advanced_package_tool | N/A | ||
2014-06-17 | CVE-2014-0478 | APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature. | Advanced_package_tool | N/A | ||
2013-03-21 | CVE-2013-1051 | apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories. | Ubuntu_linux, Advanced_package_tool, Apt | N/A | ||
2012-06-19 | CVE-2012-3587 | APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack. | Advanced_package_tool | N/A |