Vulnerability Description
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Unattended-Upgrades | <= 0.86 |
Related Weaknesses (CWE)
References
- http://metadata.ftp-master.debian.org/changelogs//main/u/unattended-upgrades/una
- http://www.debian.org/security/2015/dsa-3297
- http://www.securitytracker.com/id/1032738
- http://www.ubuntu.com/usn/USN-2657-1
- http://metadata.ftp-master.debian.org/changelogs//main/u/unattended-upgrades/una
- http://www.debian.org/security/2015/dsa-3297
- http://www.securitytracker.com/id/1032738
- http://www.ubuntu.com/usn/USN-2657-1
FAQ
What is CVE-2015-1330?
CVE-2015-1330 is a vulnerability with a CVSS score of 6.8 (MEDIUM). unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allo...
How severe is CVE-2015-1330?
CVE-2015-1330 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1330?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Unattended-Upgrades.