First published: Thu Oct 02 2014(Updated: )
The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apt | 2.2.4 2.6.1 2.9.7 | |
Debian APT Package Management | <=1.0.9.1 | |
Debian APT Package Management | =1.0.8 | |
Debian APT Package Management | =0.9.7.9-ubunto3 | |
Debian APT Package Management | =0.9.7.9-ubunto4 | |
Debian APT Package Management | =0.9.7.9-ubunto5 | |
Debian APT Package Management | =1.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7206 is classified as a moderate severity vulnerability due to its impact on local users.
To fix CVE-2014-7206, upgrade to a version of Apt that is newer than 1.0.9.1.
CVE-2014-7206 involves a symlink attack that allows local users to manipulate file writes.
Versions of Apt prior to 1.0.9.2 are affected by CVE-2014-7206.
CVE-2014-7206 cannot be exploited remotely as it requires local access to the system.