CVE-2016-1252

Published on: 12/05/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

  • CVE-2016-1252 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.9 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3733-1 apt Issue Tracking
Vendor Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3733
Bug #1647467 “InRelease file splitter treats getline() errors as...” : Bugs : apt package : Ubuntu Exploit
Issue Tracking
Third Party Advisory
bugs.launchpad.net
text/html
URL Logo CONFIRM bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
apt Repository Signing Bypass ≈ Packet Storm Issue Tracking
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
1020 - project-zero - Project Zero - Monorail Exploit
Issue Tracking
Third Party Advisory
bugs.chromium.org
text/html
URL Logo MISC bugs.chromium.org/p/project-zero/issues/detail?id=1020
USN-3156-1: APT vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3156-1
APT - Repository Signing Bypass via Memory Allocation Failure - Linux remote Exploit Exploit
Issue Tracking
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40916

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.10AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.10AllAllAll
ApplicationDebianAdvanced Package ToolAllAllAllAll
ApplicationDebianAdvanced Package ToolAllAllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*:
  • cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*: