2.6
CVSSv2

CVE-2011-3634

Published: 01/03/2014 Updated: 13/02/2023
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

methods/https.cc in apt prior to 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle malicious users to obtain repository credentials via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 10.10

canonical ubuntu linux 8.04

canonical ubuntu linux 11.04

canonical ubuntu linux 10.04

debian advanced package tool 0.8.0

debian advanced package tool 0.8.1

debian advanced package tool 0.8.10

debian advanced package tool 0.8.10.1

debian advanced package tool 0.8.10.2

debian advanced package tool

Vendor Advisories

Debian Bug report logs - #749795 apt: CVE-2014-0478: no authentication checks for source packages Package: apt; Maintainer for apt is APT Development Team <deity@listsdebianorg>; Source for apt is src:apt (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Thu, 29 May 2014 21:09:02 UTC Severity: ...
APT could be made to expose sensitive information over the network ...