Vulnerability Name:

CVE-2020-3810 (CCN-181943)

Assigned:2019-12-17
Published:2020-05-14
Updated:2022-04-27
Summary:Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-20
CWE-125
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-3810

Source: CCN
Type: Debian Web site
Apt

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugs.launchpad.net/bugs/1878177

Source: XF
Type: UNKNOWN
apt-cve20203810-dos(181943)

Source: MISC
Type: Exploit, Third Party Advisory
https://github.com/Debian/apt/issues/111

Source: MISC
Type: Mailing List, Vendor Advisory
https://lists.debian.org/debian-security-announce/2020/msg00089.html

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-f03cfe3df5

Source: MISC
Type: Patch, Vendor Advisory
https://salsa.debian.org/apt-team/apt/-/commit/dceb1e49e4b8e4dadaf056be34088b415939cda6

Source: MISC
Type: Release Notes, Vendor Advisory
https://tracker.debian.org/news/1144109/accepted-apt-212-source-into-unstable/

Source: UBUNTU
Type: Third Party Advisory
USN-4359-1

Source: UBUNTU
Type: Third Party Advisory
USN-4359-2

Source: CCN
Type: DSA-4685-1
apt security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:debian:apt:*:*:*:*:*:*:*:* (Version < 2.1.2)
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

  • Configuration CCN 1:
  • cpe:/a:debian:apt:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    debian apt *
    debian debian linux 9.0
    debian debian linux 10.0
    fedoraproject fedora 32
    canonical ubuntu linux 12.04
    canonical ubuntu linux 14.04
    canonical ubuntu linux 16.04
    canonical ubuntu linux 18.04
    canonical ubuntu linux 19.10
    canonical ubuntu linux 20.04
    debian apt *