ID UBUNTU_USN-2348-1.NASL Type nessus Reporter Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-19T00:00:00
Description
It was discovered that APT did not re-verify downloaded files when the If-Modified-Since wasn't met. (CVE-2014-0487)
It was discovered that APT did not invalidate repository data when it switched from an unauthenticated to an authenticated state.
(CVE-2014-0488)
It was discovered that the APT Acquire::GzipIndexes option caused APT to skip checksum validation. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS, and was not enabled by default.
(CVE-2014-0489)
It was discovered that APT did not correctly validate signatures when downloading source packages using the download command. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490).
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-2348-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(77726);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490");
script_xref(name:"USN", value:"2348-1");
script_name(english:"Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : apt vulnerabilities (USN-2348-1)");
script_summary(english:"Checks dpkg output for updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Ubuntu host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"It was discovered that APT did not re-verify downloaded files when the
If-Modified-Since wasn't met. (CVE-2014-0487)
It was discovered that APT did not invalidate repository data when it
switched from an unauthenticated to an authenticated state.
(CVE-2014-0488)
It was discovered that the APT Acquire::GzipIndexes option caused APT
to skip checksum validation. This issue only applied to Ubuntu 12.04
LTS and Ubuntu 14.04 LTS, and was not enabled by default.
(CVE-2014-0489)
It was discovered that APT did not correctly validate signatures when
downloading source packages using the download command. This issue
only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://usn.ubuntu.com/2348-1/"
);
script_set_attribute(attribute:"solution", value:"Update the affected apt package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:apt");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:10.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/11/03");
script_set_attribute(attribute:"patch_publication_date", value:"2014/09/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/17");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Ubuntu Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("ubuntu.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Ubuntu/release");
if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
release = chomp(release);
if (! preg(pattern:"^(10\.04|12\.04|14\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 10.04 / 12.04 / 14.04", "Ubuntu " + release);
if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
flag = 0;
if (ubuntu_check(osver:"10.04", pkgname:"apt", pkgver:"0.7.25.3ubuntu9.16")) flag++;
if (ubuntu_check(osver:"12.04", pkgname:"apt", pkgver:"0.8.16~exp12ubuntu10.19")) flag++;
if (ubuntu_check(osver:"14.04", pkgname:"apt", pkgver:"1.0.1ubuntu2.3")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apt");
}
{"id": "UBUNTU_USN-2348-1.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : apt vulnerabilities (USN-2348-1)", "description": "It was discovered that APT did not re-verify downloaded files when the If-Modified-Since wasn't met. (CVE-2014-0487)\n\nIt was discovered that APT did not invalidate repository data when it switched from an unauthenticated to an authenticated state.\n(CVE-2014-0488)\n\nIt was discovered that the APT Acquire::GzipIndexes option caused APT to skip checksum validation. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS, and was not enabled by default.\n(CVE-2014-0489)\n\nIt was discovered that APT did not correctly validate signatures when downloading source packages using the download command. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2014-09-17T00:00:00", "modified": "2021-01-19T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {}, "cvss3": {"score": null, "vector": null}, "href": "https://www.tenable.com/plugins/nessus/77726", "reporter": "Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0489", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0487", "https://usn.ubuntu.com/2348-1/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0490", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0488"], "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "immutableFields": [], "lastseen": "2022-04-16T14:09:51", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"]}, {"type": "debian", "idList": ["DEBIAN:DLA-53-1:3E958", "DEBIAN:DLA-53-1:CEB81", "DEBIAN:DSA-3025-1:72E1A", "DEBIAN:DSA-3025-1:ED57E", "DEBIAN:DSA-3025-2:46F05", "DEBIAN:DSA-3025-2:CA43A"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2014-0487", "DEBIANCVE:CVE-2014-0488", "DEBIANCVE:CVE-2014-0489", "DEBIANCVE:CVE-2014-0490"]}, {"type": "nessus", "idList": ["DEBIAN_DLA-53.NASL", "DEBIAN_DSA-3025.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310703025", "OPENVAS:1361412562310841969", "OPENVAS:703025"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31097", "SECURITYVULNS:VULN:13975"]}, {"type": "ubuntu", "idList": ["USN-2348-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2014-0487", "UB:CVE-2014-0488", "UB:CVE-2014-0489", "UB:CVE-2014-0490"]}], "rev": 4}, "score": {"value": 6.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3025-2:CA43A"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2014-0487", "DEBIANCVE:CVE-2014-0488", "DEBIANCVE:CVE-2014-0489", "DEBIANCVE:CVE-2014-0490"]}, {"type": "nessus", "idList": ["DEBIAN_DLA-53.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:703025"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31097"]}, {"type": "ubuntu", "idList": ["USN-2348-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2014-0490"]}]}, "exploitation": null, "vulnersScore": 6.0}, "_state": {"dependencies": 0}, "_internal": {}, "pluginID": "77726", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2348-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77726);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\", \"CVE-2014-0490\");\n script_xref(name:\"USN\", value:\"2348-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : apt vulnerabilities (USN-2348-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that APT did not re-verify downloaded files when the\nIf-Modified-Since wasn't met. (CVE-2014-0487)\n\nIt was discovered that APT did not invalidate repository data when it\nswitched from an unauthenticated to an authenticated state.\n(CVE-2014-0488)\n\nIt was discovered that the APT Acquire::GzipIndexes option caused APT\nto skip checksum validation. This issue only applied to Ubuntu 12.04\nLTS and Ubuntu 14.04 LTS, and was not enabled by default.\n(CVE-2014-0489)\n\nIt was discovered that APT did not correctly validate signatures when\ndownloading source packages using the download command. This issue\nonly applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2348-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected apt package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:apt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|12\\.04|14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 12.04 / 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"apt\", pkgver:\"0.7.25.3ubuntu9.16\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"apt\", pkgver:\"0.8.16~exp12ubuntu10.19\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"apt\", pkgver:\"1.0.1ubuntu2.3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"apt\");\n}\n", "naslFamily": "Ubuntu Local Security Checks", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:apt", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:14.04"], "solution": "Update the affected apt package.", "nessusSeverity": "High", "cvssScoreSource": "", "vpr": {"risk factor": "Medium", "score": "6.7"}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": "2014-09-16T00:00:00", "vulnerabilityPublicationDate": "2014-11-03T00:00:00", "exploitableWith": []}
{"nessus": [{"lastseen": "2022-04-16T14:09:56", "description": "It was discovered that APT, the high level package manager, does not properly invalidate unauthenticated data (CVE-2014-0488 ), performs incorrect verification of 304 replies (CVE-2014-0487 ), does not perform the checksum check when the Acquire::GzipIndexes option is used (CVE-2014-0489 ) and does not properly perform validation for binary packages downloaded by the apt-get download command (CVE-2014-0490 ).", "cvss3": {"score": null, "vector": null}, "published": "2014-09-17T00:00:00", "type": "nessus", "title": "Debian DSA-3025-1 : apt - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:apt", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-3025.NASL", "href": "https://www.tenable.com/plugins/nessus/77715", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3025. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77715);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\", \"CVE-2014-0490\");\n script_bugtraq_id(69835, 69836, 69837, 69838);\n script_xref(name:\"DSA\", value:\"3025\");\n\n script_name(english:\"Debian DSA-3025-1 : apt - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488 ), performs\nincorrect verification of 304 replies (CVE-2014-0487 ), does not\nperform the checksum check when the Acquire::GzipIndexes option is\nused (CVE-2014-0489 ) and does not properly perform validation for\nbinary packages downloaded by the apt-get download command\n(CVE-2014-0490 ).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-0488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-0487\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-0489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-0490\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/apt\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-3025\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the apt packages.\n\nFor the stable distribution (wheezy), these problems have been fixed\nin version 0.9.7.9+deb7u3.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:apt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"apt\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"apt-doc\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"apt-transport-https\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"apt-utils\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libapt-inst1.5\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libapt-pkg-dev\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libapt-pkg-doc\", reference:\"0.9.7.9+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libapt-pkg4.12\", reference:\"0.9.7.9+deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-04-12T15:49:01", "description": "It was discovered that APT, the high level package manager, does not properly invalidate unauthenticated data (CVE-2014-0488), performs incorrect verification of 304 replies (CVE-2014-0487) and does not perform the checksum check when the Acquire::GzipIndexes option is used (CVE-2014-0489).\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2015-03-26T00:00:00", "type": "nessus", "title": "Debian DLA-53-1 : apt security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:apt", "p-cpe:/a:debian:debian_linux:apt-doc", "p-cpe:/a:debian:debian_linux:apt-transport-https", "p-cpe:/a:debian:debian_linux:apt-utils", "p-cpe:/a:debian:debian_linux:libapt-pkg-dev", "p-cpe:/a:debian:debian_linux:libapt-pkg-doc", "cpe:/o:debian:debian_linux:6.0"], "id": "DEBIAN_DLA-53.NASL", "href": "https://www.tenable.com/plugins/nessus/82200", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-53-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82200);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\");\n script_bugtraq_id(69835, 69836, 69838, 74111);\n\n script_name(english:\"Debian DLA-53-1 : apt security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487) and does not\nperform the checksum check when the Acquire::GzipIndexes option is\nused (CVE-2014-0489).\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2014/09/msg00010.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze-lts/apt\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:apt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:apt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:apt-transport-https\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:apt-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libapt-pkg-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libapt-pkg-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"apt\", reference:\"0.8.10.3+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"apt-doc\", reference:\"0.8.10.3+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"apt-transport-https\", reference:\"0.8.10.3+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"apt-utils\", reference:\"0.8.10.3+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libapt-pkg-dev\", reference:\"0.8.10.3+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libapt-pkg-doc\", reference:\"0.8.10.3+squeeze3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2021-10-21T23:03:57", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3025-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 16, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : apt\nCVE ID : CVE-2014-0487 CVE-2014-0488 CVE-2014-0489 CVE-2014-0490\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command (CVE-2014-0490).\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 0.9.7.9+deb7u3.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.9.\n\nWe recommend that you upgrade your apt packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-09-16T16:30:05", "type": "debian", "title": "[SECURITY] [DSA 3025-1] apt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-16T16:30:05", "id": "DEBIAN:DSA-3025-1:ED57E", "href": "https://lists.debian.org/debian-security-announce/2014/msg00212.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T23:03:52", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3025-2 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 18, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : apt\nDebian Bug : 762079\n\nThe previous update for apt, DSA-3025-1, introduced a regression when\nfile:/// sources are used and those are on a different partition than\nthe apt state directory. This update fixes the regression.\n\nFor reference, the original advisory follows.\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command (CVE-2014-0490).\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.9.7.9+deb7u4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.0.9.1.\n\nWe recommend that you upgrade your apt packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-09-18T20:30:42", "type": "debian", "title": "[SECURITY] [DSA 3025-2] apt regression update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-18T20:30:42", "id": "DEBIAN:DSA-3025-2:46F05", "href": "https://lists.debian.org/debian-security-announce/2014/msg00216.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-01T11:54:34", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3025-2 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 18, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : apt\nDebian Bug : 762079\n\nThe previous update for apt, DSA-3025-1, introduced a regression when\nfile:/// sources are used and those are on a different partition than\nthe apt state directory. This update fixes the regression.\n\nFor reference, the original advisory follows.\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command (CVE-2014-0490).\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.9.7.9+deb7u4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.0.9.1.\n\nWe recommend that you upgrade your apt packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-09-18T20:30:42", "type": "debian", "title": "[SECURITY] [DSA 3025-2] apt regression update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-18T20:30:42", "id": "DEBIAN:DSA-3025-2:CA43A", "href": "https://lists.debian.org/debian-security-announce/2014/msg00216.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-30T23:52:31", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3025-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 16, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : apt\nCVE ID : CVE-2014-0487 CVE-2014-0488 CVE-2014-0489 CVE-2014-0490\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command (CVE-2014-0490).\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 0.9.7.9+deb7u3.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.9.\n\nWe recommend that you upgrade your apt packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {}, "published": "2014-09-16T16:30:05", "type": "debian", "title": "[SECURITY] [DSA 3025-1] apt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-16T16:30:05", "id": "DEBIAN:DSA-3025-1:72E1A", "href": "https://lists.debian.org/debian-security-announce/2014/msg00212.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-23T22:38:32", "description": "Package : apt\nVersion : 0.8.10.3+squeeze3\nCVE ID : CVE-2014-0487 CVE-2014-0488 CVE-2014-0489\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487) and does not\nperform the checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489).", "cvss3": {}, "published": "2014-09-16T16:51:00", "type": "debian", "title": "[SECURITY] [DLA 53-1] apt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489"], "modified": "2014-09-16T16:51:00", "id": "DEBIAN:DLA-53-1:CEB81", "href": "https://lists.debian.org/debian-lts-announce/2014/09/msg00010.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-01T05:11:30", "description": "Package : apt\nVersion : 0.8.10.3+squeeze3\nCVE ID : CVE-2014-0487 CVE-2014-0488 CVE-2014-0489\n\nIt was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data (CVE-2014-0488), performs\nincorrect verification of 304 replies (CVE-2014-0487) and does not\nperform the checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489).", "cvss3": {}, "published": "2014-09-16T16:51:00", "type": "debian", "title": "[SECURITY] [DLA 53-1] apt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487", "CVE-2014-0488", "CVE-2014-0489"], "modified": "2014-09-16T16:51:00", "id": "DEBIAN:DLA-53-1:3E958", "href": "https://lists.debian.org/debian-lts-announce/2014/09/msg00010.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2017-08-02T10:48:36", "description": "It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data\n(CVE-2014-0488), performs\nincorrect verification of 304 replies\n(CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command\n(CVE-2014-0490 \n).", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3025-1 (apt - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2017-07-18T00:00:00", "id": "OPENVAS:703025", "href": "http://plugins.openvas.org/nasl.php?oid=703025", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3025.nasl 6750 2017-07-18 09:56:47Z teissa $\n# Auto-generated from advisory DSA 3025-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703025);\n script_version(\"$Revision: 6750 $\");\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\", \"CVE-2014-0490\");\n script_name(\"Debian Security Advisory DSA 3025-1 (apt - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-18 11:56:47 +0200 (Tue, 18 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-09-16 00:00:00 +0200 (Tue, 16 Sep 2014)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-3025.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"apt on Debian Linux\");\n script_tag(name: \"insight\", value: \"This package provides commandline tools for searching and\nmanaging as well as querying information about packages\nas a low-level access to all features of the libapt-pkg library.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (wheezy), these problems have been fixed in\nversion 0.9.7.9+deb7u3.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.9.\n\nWe recommend that you upgrade your apt packages.\");\n script_tag(name: \"summary\", value: \"It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data\n(CVE-2014-0488), performs\nincorrect verification of 304 replies\n(CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command\n(CVE-2014-0490 \n).\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-transport-https\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-utils\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-inst1.5\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-dev\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg4.12\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-transport-https\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-utils\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-inst1.5\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-dev\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg4.12\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-transport-https\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-utils\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-inst1.5\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-dev\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg4.12\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-transport-https\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"apt-utils\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-inst1.5\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-dev\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapt-pkg4.12\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-09-17T00:00:00", "type": "openvas", "title": "Ubuntu Update for apt USN-2348-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841969", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841969", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2348_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for apt USN-2348-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841969\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-17 05:58:42 +0200 (Wed, 17 Sep 2014)\");\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\", \"CVE-2014-0490\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for apt USN-2348-1\");\n script_tag(name:\"insight\", value:\"It was discovered that APT did not\nre-verify downloaded files when the If-Modified-Since wasn't met. (CVE-2014-0487)\n\nIt was discovered that APT did not invalidate repository data when it\nswitched from an unauthenticated to an authenticated state. (CVE-2014-0488)\n\nIt was discovered that the APT Acquire::GzipIndexes option caused APT to\nskip checksum validation. This issue only applied to Ubuntu 12.04 LTS and\nUbuntu 14.04 LTS, and was not enabled by default. (CVE-2014-0489)\n\nIt was discovered that APT did not correctly validate signatures when\ndownloading source packages using the download command. This issue only\napplied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490)\");\n script_tag(name:\"affected\", value:\"apt on Ubuntu 14.04 LTS,\n Ubuntu 12.04 LTS,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"USN\", value:\"2348-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2348-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'apt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|12\\.04 LTS|10\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"apt\", ver:\"1.0.1ubuntu2.3\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.8.16~exp12ubuntu10.19\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"apt\", ver:\"0.7.25.3ubuntu9.16\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:20", "description": "It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data\n(CVE-2014-0488), performs\nincorrect verification of 304 replies\n(CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command\n(CVE-2014-0490\n).", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 3025-1 (apt - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310703025", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703025", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3025.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 3025-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703025\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2014-0487\", \"CVE-2014-0488\", \"CVE-2014-0489\", \"CVE-2014-0490\");\n script_name(\"Debian Security Advisory DSA 3025-1 (apt - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-16 00:00:00 +0200 (Tue, 16 Sep 2014)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-3025.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"apt on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (wheezy), these problems have been fixed in\nversion 0.9.7.9+deb7u3.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.9.\n\nWe recommend that you upgrade your apt packages.\");\n script_tag(name:\"summary\", value:\"It was discovered that APT, the high level package manager, does not\nproperly invalidate unauthenticated data\n(CVE-2014-0488), performs\nincorrect verification of 304 replies\n(CVE-2014-0487), does not perform\nthe checksum check when the Acquire::GzipIndexes option is used\n(CVE-2014-0489) and does not properly perform validation for binary\npackages downloaded by the apt-get download command\n(CVE-2014-0490\n).\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"apt\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"apt-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"apt-transport-https\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"apt-utils\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapt-inst1.5\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapt-pkg-dev\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapt-pkg-doc\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapt-pkg4.12\", ver:\"0.9.7.9+deb7u3\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:54", "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2348-1\r\nSeptember 16, 2014\r\n\r\napt vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n- Ubuntu 10.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in APT.\r\n\r\nSoftware Description:\r\n- apt: Advanced front-end for dpkg\r\n\r\nDetails:\r\n\r\nIt was discovered that APT did not re-verify downloaded files when the\r\nIf-Modified-Since wasn't met. (CVE-2014-0487)\r\n\r\nIt was discovered that APT did not invalidate repository data when it\r\nswitched from an unauthenticated to an authenticated state. (CVE-2014-0488)\r\n\r\nIt was discovered that the APT Acquire::GzipIndexes option caused APT to\r\nskip checksum validation. This issue only applied to Ubuntu 12.04 LTS and\r\nUbuntu 14.04 LTS, and was not enabled by default. (CVE-2014-0489)\r\n\r\nIt was discovered that APT did not correctly validate signatures when\r\ndownloading source packages using the download command. This issue only\r\napplied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 14.04 LTS:\r\n apt 1.0.1ubuntu2.3\r\n\r\nUbuntu 12.04 LTS:\r\n apt 0.8.16~exp12ubuntu10.19\r\n\r\nUbuntu 10.04 LTS:\r\n apt 0.7.25.3ubuntu9.16\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2348-1\r\n CVE-2014-0487, CVE-2014-0488, CVE-2014-0489, CVE-2014-0490\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.3\r\n https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.19\r\n https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.16\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2014-09-21T00:00:00", "title": "[USN-2348-1] APT vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-21T00:00:00", "id": "SECURITYVULNS:DOC:31097", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31097", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:57", "description": "Protection bypass, restrictions bypass.", "edition": 1, "cvss3": {}, "published": "2014-09-25T00:00:00", "title": "apt multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-6273", "CVE-2014-0489", "CVE-2014-0490"], "modified": "2014-09-25T00:00:00", "id": "SECURITYVULNS:VULN:13975", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13975", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2022-01-04T12:48:35", "description": "It was discovered that APT did not re-verify downloaded files when the \nIf-Modified-Since wasn't met. (CVE-2014-0487)\n\nIt was discovered that APT did not invalidate repository data when it \nswitched from an unauthenticated to an authenticated state. (CVE-2014-0488)\n\nIt was discovered that the APT Acquire::GzipIndexes option caused APT to \nskip checksum validation. This issue only applied to Ubuntu 12.04 LTS and \nUbuntu 14.04 LTS, and was not enabled by default. (CVE-2014-0489)\n\nIt was discovered that APT did not correctly validate signatures when \nmanually downloading packages using the download command. This issue only \napplied to Ubuntu 12.04 LTS. (CVE-2014-0490)\n", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "ubuntu", "title": "APT vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0488", "CVE-2014-0487", "CVE-2014-0490", "CVE-2014-0489"], "modified": "2014-09-16T00:00:00", "id": "USN-2348-1", "href": "https://ubuntu.com/security/notices/USN-2348-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:51:13", "description": "APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not\nvalidate checksums, which allows remote attackers to execute arbitrary code\nvia a crafted package.\n\n#### Bugs\n\n * <https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1366702>\n", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "ubuntucve", "title": "CVE-2014-0489", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0489"], "modified": "2014-09-16T00:00:00", "id": "UB:CVE-2014-0489", "href": "https://ubuntu.com/security/CVE-2014-0489", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:51:13", "description": "The apt-get download command in APT before 1.0.9 does not properly validate\nsignatures for packages, which allows remote attackers to execute arbitrary\ncode via a crafted package.\n\n#### Bugs\n\n * <https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1366702>\n", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "ubuntucve", "title": "CVE-2014-0490", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0490"], "modified": "2014-09-16T00:00:00", "id": "UB:CVE-2014-0490", "href": "https://ubuntu.com/security/CVE-2014-0490", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:51:13", "description": "APT before 1.0.9 does not verify downloaded files if they have been\nmodified as indicated using the If-Modified-Since header, which has\nunspecified impact and attack vectors.\n\n#### Bugs\n\n * <https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1366702>\n", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "ubuntucve", "title": "CVE-2014-0487", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487"], "modified": "2014-09-16T00:00:00", "id": "UB:CVE-2014-0487", "href": "https://ubuntu.com/security/CVE-2014-0487", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-11-22T21:55:46", "description": "APT before 1.0.9 does not \"invalidate repository data\" when moving from an\nunauthenticated to authenticated state, which allows remote attackers to\nhave unspecified impact via crafted repository data.\n\n#### Bugs\n\n * <https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1366702>\n", "cvss3": {}, "published": "2014-09-16T00:00:00", "type": "ubuntucve", "title": "CVE-2014-0488", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0488"], "modified": "2014-09-16T00:00:00", "id": "UB:CVE-2014-0488", "href": "https://ubuntu.com/security/CVE-2014-0488", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2022-05-20T11:39:40", "description": "APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "debiancve", "title": "CVE-2014-0489", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0489"], "modified": "2014-11-03T22:55:00", "id": "DEBIANCVE:CVE-2014-0489", "href": "https://security-tracker.debian.org/tracker/CVE-2014-0489", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-20T11:39:40", "description": "The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "debiancve", "title": "CVE-2014-0490", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0490"], "modified": "2014-11-03T22:55:00", "id": "DEBIANCVE:CVE-2014-0490", "href": "https://security-tracker.debian.org/tracker/CVE-2014-0490", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-20T11:39:40", "description": "APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "debiancve", "title": "CVE-2014-0487", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487"], "modified": "2014-11-03T22:55:00", "id": "DEBIANCVE:CVE-2014-0487", "href": "https://security-tracker.debian.org/tracker/CVE-2014-0487", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-20T11:39:40", "description": "APT before 1.0.9 does not \"invalidate repository data\" when moving from an unauthenticated to authenticated state, which allows remote attackers to have unspecified impact via crafted repository data.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "debiancve", "title": "CVE-2014-0488", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0488"], "modified": "2014-11-03T22:55:00", "id": "DEBIANCVE:CVE-2014-0488", "href": "https://security-tracker.debian.org/tracker/CVE-2014-0488", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T12:06:50", "description": "APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "cve", "title": "CVE-2014-0489", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0489"], "modified": "2020-01-08T15:22:00", "cpe": ["cpe:/a:debian:advanced_package_tool:1.0.5", "cpe:/a:debian:advanced_package_tool:1.0.7", "cpe:/a:debian:advanced_package_tool:1.0.3"], "id": "CVE-2014-0489", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0489", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:debian:advanced_package_tool:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.3:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:06:51", "description": "The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "cve", "title": "CVE-2014-0490", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0490"], "modified": "2020-01-08T15:22:00", "cpe": ["cpe:/a:debian:advanced_package_tool:1.0.3", "cpe:/a:debian:advanced_package_tool:1.0.5", "cpe:/a:debian:advanced_package_tool:1.0.6", "cpe:/a:debian:advanced_package_tool:1.0.4", "cpe:/a:debian:advanced_package_tool:1.0.8", "cpe:/a:debian:advanced_package_tool:1.0.7"], "id": "CVE-2014-0490", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0490", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:debian:advanced_package_tool:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.4:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:06:48", "description": "APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "cve", "title": "CVE-2014-0487", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0487"], "modified": "2020-01-08T15:22:00", "cpe": ["cpe:/a:debian:advanced_package_tool:1.0.7", "cpe:/a:debian:advanced_package_tool:1.0.3"], "id": "CVE-2014-0487", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0487", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:debian:advanced_package_tool:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.7:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:06:48", "description": "APT before 1.0.9 does not \"invalidate repository data\" when moving from an unauthenticated to authenticated state, which allows remote attackers to have unspecified impact via crafted repository data.", "cvss3": {}, "published": "2014-11-03T22:55:00", "type": "cve", "title": "CVE-2014-0488", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0488"], "modified": "2020-01-08T15:22:00", "cpe": ["cpe:/a:debian:advanced_package_tool:1.0.7", "cpe:/a:debian:advanced_package_tool:1.0.3"], "id": "CVE-2014-0488", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0488", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:debian:advanced_package_tool:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:1.0.7:*:*:*:*:*:*:*"]}]}