First published: Tue Jun 19 2012(Updated: )
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian APT Package Management | =0.7.0 | |
Debian APT Package Management | =0.7.1 | |
Debian APT Package Management | =0.7.2 | |
Debian APT Package Management | =0.7.2-0.1 | |
Debian APT Package Management | =0.7.10 | |
Debian APT Package Management | =0.7.11 | |
Debian APT Package Management | =0.7.12 | |
Debian APT Package Management | =0.7.13 | |
Debian APT Package Management | =0.7.14 | |
Debian APT Package Management | =0.7.15 | |
Debian APT Package Management | =0.7.15-exp1 | |
Debian APT Package Management | =0.7.15-exp2 | |
Debian APT Package Management | =0.7.15-exp3 | |
Debian APT Package Management | =0.7.16 | |
Debian APT Package Management | =0.7.17 | |
Debian APT Package Management | =0.7.17-exp1 | |
Debian APT Package Management | =0.7.17-exp2 | |
Debian APT Package Management | =0.7.17-exp3 | |
Debian APT Package Management | =0.7.17-exp4 | |
Debian APT Package Management | =0.7.18 | |
Debian APT Package Management | =0.7.19 | |
Debian APT Package Management | =0.7.20 | |
Debian APT Package Management | =0.7.20.1 | |
Debian APT Package Management | =0.7.20.2 | |
Debian APT Package Management | =0.7.21 | |
Debian APT Package Management | =0.7.22 | |
Debian APT Package Management | =0.7.22.1 | |
Debian APT Package Management | =0.7.22.2 | |
Debian APT Package Management | =0.7.23 | |
Debian APT Package Management | =0.7.23.1 | |
Debian APT Package Management | =0.7.24 | |
Debian APT Package Management | =0.8.0 | |
Debian APT Package Management | =0.8.0-pre1 | |
Debian APT Package Management | =0.8.0-pre2 | |
Debian APT Package Management | =0.8.1 | |
Debian APT Package Management | =0.8.10 | |
Debian APT Package Management | =0.8.10.1 | |
Debian APT Package Management | =0.8.10.2 | |
Debian APT Package Management | =0.8.10.3 | |
Debian APT Package Management | =0.8.11 | |
Debian APT Package Management | =0.8.11.1 | |
Debian APT Package Management | =0.8.11.2 | |
Debian APT Package Management | =0.8.11.3 | |
Debian APT Package Management | =0.8.11.4 | |
Debian APT Package Management | =0.8.11.5 | |
Debian APT Package Management | =0.8.12 | |
Debian APT Package Management | =0.8.13 | |
Debian APT Package Management | =0.8.13.1 | |
Debian APT Package Management | =0.8.13.2 | |
Debian APT Package Management | =0.8.14 | |
Debian APT Package Management | =0.8.14.1 | |
Debian APT Package Management | =0.8.15 | |
Debian APT Package Management | =0.8.15-exp1 | |
Debian APT Package Management | =0.8.15-exp2 | |
Debian APT Package Management | =0.8.15-exp3 | |
Debian APT Package Management | =0.8.15.1 | |
Debian APT Package Management | =0.8.15.6 | |
Debian APT Package Management | =0.8.15.7 | |
Debian APT Package Management | =0.8.15.8 | |
Debian APT Package Management | =0.8.15.9 | |
Debian APT Package Management | =0.8.15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3587 is classified as a high-severity vulnerability due to its potential for remote exploitation via man-in-the-middle attacks.
To fix CVE-2012-3587, upgrade to Advanced Package Tool versions 0.7.25, 0.8.16, or later.
CVE-2012-3587 affects versions 0.7.x prior to 0.7.25 and 0.8.x prior to 0.8.16 of the Advanced Package Tool.
CVE-2012-3587 works by exploiting the reliance on GnuPG argument order and lack of GPG subkey verification to allow attackers to install unverified packages.
There is no officially recommended workaround for CVE-2012-3587; the best course of action is to apply the available updates.