6.3 Medium
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
70.5%
Jann Horn discovered that dpkg incorrectly validated signatures when
extracting local source packages. If a user or an automated system were
tricked into unpacking a specially crafted source package, a remote
attacker could bypass signature verification checks.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.10 | noarch | libdpkg-perl | < 1.17.13ubuntu1.1 | UNKNOWN |
Ubuntu | 14.10 | noarch | dpkg | < 1.17.13ubuntu1.1 | UNKNOWN |
Ubuntu | 14.10 | noarch | dselect | < 1.17.13ubuntu1.1 | UNKNOWN |
Ubuntu | 14.10 | noarch | libdpkg-dev | < 1.17.13ubuntu1.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | libdpkg-perl | < 1.17.5ubuntu5.4 | UNKNOWN |
Ubuntu | 14.04 | noarch | dpkg | < 1.17.5ubuntu5.4 | UNKNOWN |
Ubuntu | 14.04 | noarch | dselect | < 1.17.5ubuntu5.4 | UNKNOWN |
Ubuntu | 14.04 | noarch | libdpkg-dev | < 1.17.5ubuntu5.4 | UNKNOWN |
Ubuntu | 12.04 | noarch | libdpkg-perl | < 1.16.1.2ubuntu7.6 | UNKNOWN |
Ubuntu | 12.04 | noarch | dpkg | < 1.16.1.2ubuntu7.6 | UNKNOWN |