6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
This update fixes a regression introduced in 0.8.10.3+squeeze5 where
apt would send invalid HTTP requests when sending If-Range queries.
For reference, the original advisory text follows.
The Google Security Team discovered a buffer overflow vulnerability in
the HTTP transport code in apt-get. An attacker able to
man-in-the-middle a HTTP request to an apt repository can trigger the
buffer overflow, leading to a crash of the http apt method binary, or
potentially to arbitrary code execution.
The following regression fixes were included in this update:
For Debian 6 Squeeze, these issues have been fixed in apt version 0.8.10.3+squeeze6
CPE | Name | Operator | Version |
---|---|---|---|
apt | eq | 0.8.10.3 | |
apt | eq | 0.8.10.3+squeeze3 | |
apt | eq | 0.8.10.3+squeeze1 | |
apt | eq | 0.8.10.3+squeeze2 |