2.6
CVE-2011-3634
- EPSS 0.16%
- Veröffentlicht 01.03.2014 00:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Debian ≫ Advanced Package Tool Version <= 0.8.10.3
Debian ≫ Advanced Package Tool Version0.8.0
Debian ≫ Advanced Package Tool Version0.8.0 Updatepre1
Debian ≫ Advanced Package Tool Version0.8.0 Updatepre2
Debian ≫ Advanced Package Tool Version0.8.1
Debian ≫ Advanced Package Tool Version0.8.10
Debian ≫ Advanced Package Tool Version0.8.10.1
Debian ≫ Advanced Package Tool Version0.8.10.2
Canonical ≫ Ubuntu Linux Version8.04 Update- Editionlts
Canonical ≫ Ubuntu Linux Version10.04 Update- Editionlts
Canonical ≫ Ubuntu Linux Version10.10
Canonical ≫ Ubuntu Linux Version11.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.339 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.