First published: Fri Feb 28 2014(Updated: )
methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apt | 2.2.4 2.6.1 2.9.7 | |
Debian APT Package Management | <=0.8.10.3 | |
Debian APT Package Management | =0.8.0 | |
Debian APT Package Management | =0.8.0-pre1 | |
Debian APT Package Management | =0.8.0-pre2 | |
Debian APT Package Management | =0.8.1 | |
Debian APT Package Management | =0.8.10 | |
Debian APT Package Management | =0.8.10.1 | |
Debian APT Package Management | =0.8.10.2 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu | =10.10 | |
Ubuntu | =8.04 | |
Ubuntu | =11.04 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3634 has been classified as a high-severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2011-3634, update your apt package to version 0.8.11 or later.
CVE-2011-3634 affects apt versions prior to 0.8.11, including several versions such as 0.8.0 and 0.8.10.x.
CVE-2011-3634 can facilitate man-in-the-middle attacks, leading to the exposure of repository credentials.
CVE-2011-3634 impacts multiple versions of Ubuntu and Debian distributions that are running affected versions of apt.