Описание
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
Ссылки
- Broken Link
- Issue TrackingMailing ListThird Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Broken Link
- Issue TrackingMailing ListThird Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Broken Link
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01509
Низкий
3.7 Low
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-347
Связанные уязвимости
CVSS3: 3.7
ubuntu
около 6 лет назад
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
CVSS3: 3.7
debian
около 6 лет назад
It was found that apt-key in apt, all versions, do not correctly valid ...
CVSS3: 3.7
github
почти 4 года назад
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
EPSS
Процентиль: 81%
0.01509
Низкий
3.7 Low
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-347