CERTA-2005-AVI-296

Vulnerability from certfr_avis - Published: 2005-08-05 - Updated: 2005-08-05

None

Description

La mise à jour d'un système d'exploitation Debian par le réseau, consiste notamment à télécharger sur les sites dédiés à la maintenance les mises à jours disponibles sous la forme de fichiers paquetages (fichiers dont le nom porte l'extenion .deb) ou de fichiers sources.

apt-cacher est un logiciel qui met en œuvre un cache pour les paquets téléchargés. Sur un site regroupant plusieurs machines Debian, l'utilisation d'un tel cache a pour objectif d'optimiser la connexion à l'Internet.

La version de apt-cacher a une vulnérabilité qui permet à un utilisateur mal intentionné distant de faire exécuter n'importe quelle commande à un système vulnérable.

Solution

La version 0.9.10 de apt-cacher corrige la vulnérabilité.

None
Impacted products
Vendor Product Description
Debian N/A Debian GNU/Linux unstable alias Sid ;
Debian N/A version de apt-cacher antérieure à 0.9.10.
Debian N/A Debian GNU/Linux 3.1 alias Sarge ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Debian GNU/Linux unstable alias Sid ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "version de apt-cacher ant\u00e9rieure \u00e0 0.9.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Debian GNU/Linux 3.1 alias Sarge ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLa mise \u00e0 jour d\u0027un syst\u00e8me d\u0027exploitation Debian par le r\u00e9seau,\nconsiste notamment \u00e0 t\u00e9l\u00e9charger sur les sites d\u00e9di\u00e9s \u00e0 la maintenance\nles mises \u00e0 jours disponibles sous la forme de fichiers paquetages\n(fichiers dont le nom porte l\u0027extenion .deb) ou de fichiers sources.\n\napt-cacher est un logiciel qui met en \u0153uvre un cache pour les paquets\nt\u00e9l\u00e9charg\u00e9s. Sur un site regroupant plusieurs machines Debian,\nl\u0027utilisation d\u0027un tel cache a pour objectif d\u0027optimiser la connexion \u00e0\nl\u0027Internet.\n\nLa version de apt-cacher a une vuln\u00e9rabilit\u00e9 qui permet \u00e0 un utilisateur\nmal intentionn\u00e9 distant de faire ex\u00e9cuter n\u0027importe quelle commande \u00e0 un\nsyst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nLa version 0.9.10 de apt-cacher corrige la vuln\u00e9rabilit\u00e9.\n",
  "cves": [],
  "initial_release_date": "2005-08-05T00:00:00",
  "last_revision_date": "2005-08-05T00:00:00",
  "links": [
    {
      "title": "Avis de s\u00e9curit\u00e9 Debian :",
      "url": "http://www.debian.org/security/2005/dsa-772"
    }
  ],
  "reference": "CERTA-2005-AVI-296",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-08-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 de apt-cacher",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis Debian 2005/DSA-772",
      "url": null
    },
    {
      "published_at": null,
      "title": "R\u00e9f\u00e9rence CVE : CAN-2005-1854",
      "url": "https://www.cve.org/CVERecord?id=CAN-2005-1854"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…