Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
References
Link | Resource |
---|---|
https://www.debian.org/security/2019/dsa-4371 | Patch Vendor Advisory |
https://usn.ubuntu.com/3863-2/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20190125-0002/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/106690 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/3863-1/ | Third Party Advisory |
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-01-28 13:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-3462
Mitre link : CVE-2019-3462
JSON object : View
CWE
Products Affected
netapp
- active_iq
- element_software
debian
- advanced_package_tool
- debian_linux
canonical
- ubuntu_linux