First published: Tue Sep 30 2014(Updated: )
Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian APT Package Management | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6273 is classified as a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To mitigate CVE-2014-6273, upgrade to a version of APT newer than 1.0.1.
CVE-2014-6273 affects APT 1.0.1 and earlier versions.
CVE-2014-6273 allows man-in-the-middle attackers to exploit the vulnerability through crafted URLs.
Debian systems using the Advanced Package Tool (APT) version 1.0.1 and earlier are primarily impacted by CVE-2014-6273.