2.6
CVE-2011-3634
- EPSS 0.16%
- Published 01.03.2014 00:55:04
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Advanced Package Tool Version <= 0.8.10.3
Debian ≫ Advanced Package Tool Version0.8.0
Debian ≫ Advanced Package Tool Version0.8.0 Updatepre1
Debian ≫ Advanced Package Tool Version0.8.0 Updatepre2
Debian ≫ Advanced Package Tool Version0.8.1
Debian ≫ Advanced Package Tool Version0.8.10
Debian ≫ Advanced Package Tool Version0.8.10.1
Debian ≫ Advanced Package Tool Version0.8.10.2
Canonical ≫ Ubuntu Linux Version8.04 Update- Editionlts
Canonical ≫ Ubuntu Linux Version10.04 Update- Editionlts
Canonical ≫ Ubuntu Linux Version10.10
Canonical ≫ Ubuntu Linux Version11.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.339 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.