CVE-2012-3587
19.06.2012, 20:55
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.Enginsight
Vendor | Product | Version |
---|---|---|
debian | advanced_package_tool | 0.7.0 |
debian | advanced_package_tool | 0.7.1 |
debian | advanced_package_tool | 0.7.2 |
debian | advanced_package_tool | 0.7.2-0.1 |
debian | advanced_package_tool | 0.7.10 |
debian | advanced_package_tool | 0.7.11 |
debian | advanced_package_tool | 0.7.12 |
debian | advanced_package_tool | 0.7.13 |
debian | advanced_package_tool | 0.7.14 |
debian | advanced_package_tool | 0.7.15 |
debian | advanced_package_tool | 0.7.15:exp1 |
debian | advanced_package_tool | 0.7.15:exp2 |
debian | advanced_package_tool | 0.7.15:exp3 |
debian | advanced_package_tool | 0.7.16 |
debian | advanced_package_tool | 0.7.17 |
debian | advanced_package_tool | 0.7.17:exp1 |
debian | advanced_package_tool | 0.7.17:exp2 |
debian | advanced_package_tool | 0.7.17:exp3 |
debian | advanced_package_tool | 0.7.17:exp4 |
debian | advanced_package_tool | 0.7.18 |
debian | advanced_package_tool | 0.7.19 |
debian | advanced_package_tool | 0.7.20 |
debian | advanced_package_tool | 0.7.20.1 |
debian | advanced_package_tool | 0.7.20.2 |
debian | advanced_package_tool | 0.7.21 |
debian | advanced_package_tool | 0.7.22 |
debian | advanced_package_tool | 0.7.22.1 |
debian | advanced_package_tool | 0.7.22.2 |
debian | advanced_package_tool | 0.7.23 |
debian | advanced_package_tool | 0.7.23.1 |
debian | advanced_package_tool | 0.7.24 |
debian | advanced_package_tool | 0.8.0 |
debian | advanced_package_tool | 0.8.0:pre1 |
debian | advanced_package_tool | 0.8.0:pre2 |
debian | advanced_package_tool | 0.8.1 |
debian | advanced_package_tool | 0.8.10 |
debian | advanced_package_tool | 0.8.10.1 |
debian | advanced_package_tool | 0.8.10.2 |
debian | advanced_package_tool | 0.8.10.3 |
debian | advanced_package_tool | 0.8.11 |
debian | advanced_package_tool | 0.8.11.1 |
debian | advanced_package_tool | 0.8.11.2 |
debian | advanced_package_tool | 0.8.11.3 |
debian | advanced_package_tool | 0.8.11.4 |
debian | advanced_package_tool | 0.8.11.5 |
debian | advanced_package_tool | 0.8.12 |
debian | advanced_package_tool | 0.8.13 |
debian | advanced_package_tool | 0.8.13.1 |
debian | advanced_package_tool | 0.8.13.2 |
debian | advanced_package_tool | 0.8.14 |
debian | advanced_package_tool | 0.8.14.1 |
debian | advanced_package_tool | 0.8.15 |
debian | advanced_package_tool | 0.8.15:exp1 |
debian | advanced_package_tool | 0.8.15:exp2 |
debian | advanced_package_tool | 0.8.15:exp3 |
debian | advanced_package_tool | 0.8.15.1 |
debian | advanced_package_tool | 0.8.15.6 |
debian | advanced_package_tool | 0.8.15.7 |
debian | advanced_package_tool | 0.8.15.8 |
debian | advanced_package_tool | 0.8.15.9 |
debian | advanced_package_tool | 0.8.15.10 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References