First published: Mon Nov 03 2014(Updated: )
APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian APT Package Management | =1.0.3 | |
Debian APT Package Management | =1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-0487 is considered moderate, primarily due to the lack of verification for downloaded files.
To fix CVE-2014-0487, upgrade to APT version 1.0.9 or later.
The affected versions of APT are 1.0.3 and 1.0.7.
CVE-2014-0487 may allow an attacker to modify downloaded files without detection.
CVE-2014-0487 impacts Debian systems that utilize the affected versions of APT.