First published: Thu May 29 2014(Updated: )
APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apt | <=0.9.7.9+deb7u1<=1.0.3 | 1.0.4 0.8.10.3+squeeze2 0.9.7.9+deb7u2 |
debian/apt | 2.2.4 2.6.1 2.9.7 | |
Debian APT Package Management | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0478 is considered to have a high severity as it allows man-in-the-middle attackers to install malicious packages.
To fix CVE-2014-0478, you should upgrade to APT version 1.0.4 or later.
APT versions prior to 1.0.4, including 0.9.7.9+deb7u1 and earlier, are affected by CVE-2014-0478.
CVE-2014-0478 enables man-in-the-middle attacks that can result in the installation of Trojan horse packages.
Upgrading APT to version 1.0.4 or later is the primary mitigation for CVE-2014-0478 to ensure proper validation of source packages.