Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2c4h-r267-mgv3

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.

EPSS

Процентиль: 37%
0.00156
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 13 лет назад

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.

nvd
больше 13 лет назад

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.

debian
больше 13 лет назад

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-ke ...

EPSS

Процентиль: 37%
0.00156
Низкий

Дефекты

CWE-20