Summary
The Google Security Team discovered a buffer overflow vulnerability in the HTTP transport code in apt-get. An attacker able to man-in-the-middle a HTTP request to an apt repository can trigger the buffer overflow, leading to a crash of the http
apt method binary, or
potentially to arbitrary code execution.
Two regression fixes were included in this update:
Fix regression from the previous update in DSA-3025-1 when the custom apt configuration option for Dir::state::lists is set to a relative path (#762160).
Fix regression in the reverification handling of cdrom: sources that may lead to incorrect hashsum warnings. Affected users need to run 'apt-cdrom add' again after the update was applied.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 0.9.7.9+deb7u5.
We recommend that you upgrade your apt packages.
Insight
This package provides commandline tools for searching and managing as well as querying information about packages as a low-level access to all features of the libapt-pkg library.
Affected
apt on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-6273 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities