Show filters
25 Total Results
Displaying 11-20 of 25
Sort by:
Attacker Value
Unknown

CVE-2014-0489

Disclosure Date: November 03, 2014 (last updated October 05, 2023)
APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package.
0
Attacker Value
Unknown

CVE-2014-0490

Disclosure Date: November 03, 2014 (last updated October 05, 2023)
The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.
0
Attacker Value
Unknown

CVE-2014-0487

Disclosure Date: November 03, 2014 (last updated October 05, 2023)
APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.
0
Attacker Value
Unknown

CVE-2014-7206

Disclosure Date: October 15, 2014 (last updated October 05, 2023)
The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.
0
Attacker Value
Unknown

CVE-2014-6273

Disclosure Date: September 30, 2014 (last updated October 05, 2023)
Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
0
Attacker Value
Unknown

CVE-2014-0478

Disclosure Date: June 17, 2014 (last updated October 05, 2023)
APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.
0
Attacker Value
Unknown

CVE-2012-0214

Disclosure Date: April 15, 2014 (last updated October 05, 2023)
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user from downloading the new InRelease file, which leaves the original InRelease file active and makes it more difficult to detect that the Packages file is modified and unsigned.
0
Attacker Value
Unknown

CVE-2011-3634

Disclosure Date: March 01, 2014 (last updated October 05, 2023)
methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.
0
Attacker Value
Unknown

CVE-2013-1051

Disclosure Date: March 21, 2013 (last updated October 05, 2023)
apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories.
0
Attacker Value
Unknown

CVE-2012-0961

Disclosure Date: December 26, 2012 (last updated October 05, 2023)
Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensitive shell information by reading the log file.
0