CVE-2016-1252
MEDIUMDebian jessie <1.0.9.8.4, Debian unstable <1.4~beta2, Ubuntu 14.04 ...
Title source: llmDescription
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textremotelinux
https://www.exploit-db.com/exploits/40916
References (6)
Core 6
Core References
Issue Tracking, Vendor Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2016/dsa-3733
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3156-1
Issue Tracking, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
Exploit, Issue Tracking, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/40916/
Exploit, Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
Scores
CVSS v3
5.9
EPSS
0.0595
EPSS Percentile
90.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-295
Status
published
Products (4)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
16.10
debian/advanced_package_tool
< 1.0.9.8.4
Published
Dec 05, 2017
Tracked Since
Feb 18, 2026