Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "apt"
},
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "apt-transport-https"
},
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "apt-utils"
},
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "libapt-inst1.5"
},
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "libapt-pkg-dev"
},
{
"binary_version": "1.0.1ubuntu2.4.1",
"binary_name": "libapt-pkg4.12"
}
]
}