CVE-2015-0840

EUVD-2015-0852
The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
Affected Products (NVD)
VendorProductVersion
debiandpkg
𝑥
≤ 1.16.15
debiandpkg
1.17.0
debiandpkg
1.17.1
debiandpkg
1.17.2
debiandpkg
1.17.3
debiandpkg
1.17.4
debiandpkg
1.17.5
debiandpkg
1.17.6
debiandpkg
1.17.7
debiandpkg
1.17.8
debiandpkg
1.17.9
debiandpkg
1.17.10
debiandpkg
1.17.11
debiandpkg
1.17.12
debiandpkg
1.17.13
debiandpkg
1.17.14
debiandpkg
1.17.15
debiandpkg
1.17.16
debiandpkg
1.17.17
debiandpkg
1.17.18
debiandpkg
1.17.19
debiandpkg
1.17.20
debiandpkg
1.17.21
debiandpkg
1.17.22
debiandpkg
1.17.23
debiandpkg
1.17.24
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpkg
bookworm
1.21.22
fixed
bullseye
1.20.13
fixed
bullseye (security)
1.20.10
fixed
sid
1.22.11
fixed
trixie
1.22.11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpkg
lucid
Fixed 1.15.5.6ubuntu4.10
released
precise
Fixed 1.16.1.2ubuntu7.6
released
trusty
Fixed 1.17.5ubuntu5.4
released
utopic
Fixed 1.17.13ubuntu1.1
released