Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2019-15796

Disclosure Date: December 12, 2019
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Python-apt doesn’t check if hashes are signed in Version.fetch_binary() and Version.fetch_source() of apt/package.py or in _fetch_archives() of apt/cache.py in version 1.9.3ubuntu2 and earlier. This allows downloads from unsigned repositories which shouldn’t be allowed and has been fixed in verisions 1.9.5, 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.7 Medium
Impact Score:
2.7
Exploitability Score:
1.6
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • debian,
  • ubuntu

Products

  • python-apt 0.8.0,
  • python-apt 0.8.1,
  • python-apt 0.8.3,
  • python-apt 0.8.9.1,
  • python-apt 0.9.0,
  • python-apt 0.9.1,
  • python-apt 0.9.3.1,
  • python-apt 0.9.3.2,
  • python-apt 0.9.3.3,
  • python-apt 0.9.3.4,
  • python-apt 0.9.3.5,
  • python-apt 1.0.1,
  • python-apt 1.1.0,
  • python-apt 1.4.0,
  • python-apt 1.6.0,
  • python-apt 1.6.1,
  • python-apt 1.6.2,
  • python-apt 1.6.3,
  • python-apt 1.6.4,
  • python-apt 1.7.0,
  • python-apt 1.8.0,
  • python-apt 1.8.1,
  • python-apt 1.8.2,
  • python-apt 1.8.3,
  • python-apt 1.8.4,
  • python-apt 1.9.0

Additional Info

Technical Analysis