Vulnerability Name: | CVE-2019-3462 (CCN-155966) | ||||||||||||||||||||||||||||||||
Assigned: | 2018-12-31 | ||||||||||||||||||||||||||||||||
Published: | 2019-01-18 | ||||||||||||||||||||||||||||||||
Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||
Summary: | Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-3462 Source: CCN Type: IBM Security Bulletin 881778 (VRA - Vyatta 5600) Vyatta 5600 vRouter Software Patches - Release 1801-v Source: BID Type: Third Party Advisory, VDB Entry 106690 Source: CCN Type: Launchpad Bug #1812353 content injection in http method (CVE-2019-3462) Source: XF Type: UNKNOWN apt-cve20193462-code-exec(155966) Source: MLIST Type: Mailing List, Vendor Advisory [infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1. Source: MLIST Type: Mailing List, Vendor Advisory [debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update Source: MLIST Type: Mailing List, Vendor Advisory [debian-lts-announce] 20190122 [SECURITY] [DLA 1637-1] apt security update (amended) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190125-0002/ Source: CCN Type: The Hacker News Web site Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems Source: UBUNTU Type: Third Party Advisory USN-3863-1 Source: UBUNTU Type: Third Party Advisory USN-3863-2 Source: CCN Type: Debian Web site Advanced Package Tool (APT) Source: DEBIAN Type: Patch, Vendor Advisory DSA-4371 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |