Vulnerability Description
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Advanced Package Tool | < 1.0.9.8.4 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.htmlIssue TrackingThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3156-1Third Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1020ExploitIssue TrackingThird Party Advisory
- https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467ExploitIssue TrackingThird Party Advisory
- https://www.debian.org/security/2016/dsa-3733Issue TrackingVendor Advisory
- https://www.exploit-db.com/exploits/40916/ExploitIssue TrackingThird Party Advisory
- http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.htmlIssue TrackingThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3156-1Third Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1020ExploitIssue TrackingThird Party Advisory
- https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467ExploitIssue TrackingThird Party Advisory
- https://www.debian.org/security/2016/dsa-3733Issue TrackingVendor Advisory
- https://www.exploit-db.com/exploits/40916/ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2016-1252?
CVE-2016-1252 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 befo...
How severe is CVE-2016-1252?
CVE-2016-1252 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1252?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Advanced Package Tool, Debian Debian Linux, Canonical Ubuntu Linux.