Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2019-15795

Disclosure Date: August 06, 2019
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

python-apt only checks the MD5 sums of downloaded files in Version.fetch_binary() and Version.fetch_source() of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.7 Medium
Impact Score:
2.7
Exploitability Score:
1.6
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • debian,
  • ubuntu

Products

  • python-apt 0.8.0,
  • python-apt 0.8.1,
  • python-apt 0.8.3,
  • python-apt 0.8.9.1,
  • python-apt 0.9.0,
  • python-apt 0.9.1,
  • python-apt 0.9.3.1,
  • python-apt 0.9.3.2,
  • python-apt 0.9.3.3,
  • python-apt 0.9.3.4,
  • python-apt 0.9.3.5,
  • python-apt 1.0.1,
  • python-apt 1.1.0,
  • python-apt 1.4.0,
  • python-apt 1.6.0,
  • python-apt 1.6.1,
  • python-apt 1.6.2,
  • python-apt 1.6.3,
  • python-apt 1.6.4,
  • python-apt 1.7.0,
  • python-apt 1.8.0,
  • python-apt 1.8.1,
  • python-apt 1.8.2,
  • python-apt 1.8.3,
  • python-apt 1.8.4,
  • python-apt 1.9.0

Additional Info

Technical Analysis