{ "id": "CVE-2015-1330", "sourceIdentifier": "security@ubuntu.com", "published": "2015-07-01T14:59:04.360", "lastModified": "2024-11-21T02:25:10.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vectors." }, { "lang": "es", "value": "unattended-upgrades anterior a 0.86.1 no autentica correctamente paquetes cuando las opciones (1) force-confold o (2) force-confnew dpkg est\u00e1n habilitadas en la configuraci\u00f3n DPkg::Options::* apt, lo que permite a atacantes man-in-the-middle remotos subir y ejecutar paquetes arbitrarios a trav\u00e9s de vectores no especificados." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:debian:unattended-upgrades:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.86", "matchCriteriaId": "C2EC566C-C111-48FE-A4E8-EFF19E19E46B" } ] } ] } ], "references": [ { "url": "http://metadata.ftp-master.debian.org/changelogs//main/u/unattended-upgrades/unattended-upgrades_0.86.1_changelog", "source": "security@ubuntu.com" }, { "url": "http://www.debian.org/security/2015/dsa-3297", "source": "security@ubuntu.com" }, { "url": "http://www.securitytracker.com/id/1032738", "source": "security@ubuntu.com" }, { "url": "http://www.ubuntu.com/usn/USN-2657-1", "source": "security@ubuntu.com" }, { "url": "http://metadata.ftp-master.debian.org/changelogs//main/u/unattended-upgrades/unattended-upgrades_0.86.1_changelog", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2015/dsa-3297", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securitytracker.com/id/1032738", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.ubuntu.com/usn/USN-2657-1", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }