CVE-2016-1252

Published: Dic 05, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2016-2351 Aliases: GSD-2016-1252
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: none
MEDIUM 4,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0596
Percentile
0,9th
Updated

EPSS Score Trend (Last 90 Days)

295

Improper Certificate Validation

Draft
Common Consequences
Security Scopes Affected:
Integrity Authentication
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
Exploit

APT - Repository Signing Bypass via Memory Allocation …

Verified

APT - Repository Signing Bypass via Memory Allocation Failure

View Exploit Code →
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Advanced Package Tool by Debian

Version Range Affected
To 1.0.9.8.4 (exclusive)
cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://packetstormsecurity.com/files/140145/apt-Repository-…
Issue Tracking Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
https://bugs.chromium.org/p/project-zero/issues/detail?id=1…
Exploit Issue Tracking Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
Exploit Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
Exploit Issue Tracking Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/40916/
http://www.ubuntu.com/usn/USN-3156-1
http://packetstormsecurity.com/files/140145/apt-Repository-…
Issue Tracking Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
https://bugs.chromium.org/p/project-zero/issues/detail?id=1…
Exploit Issue Tracking Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1020
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
Exploit Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
https://www.debian.org/security/2016/dsa-3733
https://www.exploit-db.com/exploits/40916/
Exploit Issue Tracking Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/40916/
http://www.ubuntu.com/usn/USN-3156-1