Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15163

Опубликовано: 09 сент. 2020
Источник: debian
EPSS Низкий

Описание

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-tufnot-affectedpackage

EPSS

Процентиль: 35%
0.00144
Низкий

Связанные уязвимости

CVSS3: 8.7
nvd
больше 5 лет назад

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

CVSS3: 8.7
github
больше 5 лет назад

Invalid root may become trusted root in The Update Framework (TUF)

EPSS

Процентиль: 35%
0.00144
Низкий