Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106690 | vdb entry third party advisory |
https://usn.ubuntu.com/3863-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3863-2/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html | mailing list vendor advisory |
https://www.debian.org/security/2019/dsa-4371 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html | mailing list vendor advisory |
https://security.netapp.com/advisory/ntap-20190125-0002/ | third party advisory |
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E | mailing list |