CVE-2012-0954

CVSS V2 Low 2.6 CVSS V3 None
Description
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
Overview
  • CVE ID
  • CVE-2012-0954
  • Assigner
  • security@ubuntu.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2012-06-19T20:55:05
  • Last Modified Date
  • 2020-01-08T15:13:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.2-0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp2:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp3:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp2:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp3:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp4:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.20.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.20.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.22.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.22.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.23.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.7.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre1:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre2:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.10.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.11.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp2:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp3:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:debian:advanced_package_tool:0.8.15.10:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 2.6
  • Severity
  • LOW
  • Exploitability Score
  • 4.9
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 16:54:24 Added to TrackCVE