Unknown
CVE-2019-15796
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-15796
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Python-apt doesn’t check if hashes are signed in Version.fetch_binary()
and Version.fetch_source()
of apt/package.py or in _fetch_archives()
of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn’t be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- python-apt 0.8.0,
- python-apt 0.8.1,
- python-apt 0.8.3,
- python-apt 0.8.9.1,
- python-apt 0.9.0,
- python-apt 0.9.1,
- python-apt 0.9.3.1,
- python-apt 0.9.3.2,
- python-apt 0.9.3.3,
- python-apt 0.9.3.4,
- python-apt 0.9.3.5,
- python-apt 1.0.1,
- python-apt 1.1.0,
- python-apt 1.4.0,
- python-apt 1.6.0,
- python-apt 1.6.1,
- python-apt 1.6.2,
- python-apt 1.6.3,
- python-apt 1.6.4,
- python-apt 1.7.0,
- python-apt 1.8.0,
- python-apt 1.8.1,
- python-apt 1.8.2,
- python-apt 1.8.3,
- python-apt 1.8.4,
- python-apt 1.9.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: