Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-doc" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-transport-https" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-utils" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-inst1.5" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg-dev" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg-doc" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg4.12" } ], "ubuntu_priority": "medium" }