Vulnerability Description
The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Advanced Package Tool | <= 1.0.8 |
| Linux | Linux Kernel | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/61275
- http://secunia.com/advisories/61286
- http://ubuntu.com/usn/usn-2348-1PatchVendor Advisory
- http://www.debian.org/security/2014/dsa-3025Vendor Advisory
- http://secunia.com/advisories/61275
- http://secunia.com/advisories/61286
- http://ubuntu.com/usn/usn-2348-1PatchVendor Advisory
- http://www.debian.org/security/2014/dsa-3025Vendor Advisory
FAQ
What is CVE-2014-0490?
CVE-2014-0490 is a vulnerability with a CVSS score of 7.5 (HIGH). The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.
How severe is CVE-2014-0490?
CVE-2014-0490 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0490?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Advanced Package Tool, Linux Linux Kernel.