First published: Mon Apr 21 2008(Updated: )
The GUI for aptlinex before 0.91 does not sufficiently warn the user of potentially dangerous actions, which allows remote attackers to remove or modify packages via an apt:// URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Aptlinex | =0.9-1 | |
Debian Aptlinex | =0.8-2 | |
Debian Aptlinex | =0.8-1 | |
Debian Aptlinex | =0.6-1 | |
Debian Aptlinex | =0.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1902 is considered a medium severity vulnerability due to its ability to allow remote attackers to modify or remove packages.
To fix CVE-2008-1902, upgrade to aptlinex version 0.91 or later, where the issue has been addressed.
Exploitation of CVE-2008-1902 occurs when a user is misled into executing a dangerous action via an apt:// URL without sufficient warnings.
Versions 0.6-1, 0.7-1, 0.8-1, 0.8-2, and 0.9-1 of aptlinex are all vulnerable to CVE-2008-1902.
CVE-2008-1902 allows remote attackers to potentially remove or modify packages on the user's system.