### [CVE-2016-1252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures. ### POC #### Reference - http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 - https://www.exploit-db.com/exploits/40916/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/AlexRogalskiy/securecloud-image-analysis-action - https://github.com/KorayAgaya/TrivyWeb - https://github.com/Mohzeela/external-secret - https://github.com/Tufin/securecloud-image-analysis-action - https://github.com/actions-marketplace-validations/Tufin_securecloud-image-analysis-action - https://github.com/bahramGithubRepository/CVE-Management-Tool - https://github.com/illikainen/digestlookup - https://github.com/jaweesh/Packet-Injection-in-Sudan-Analysis - https://github.com/siddharthraopotukuchi/trivy - https://github.com/simiyo/trivy - https://github.com/t31m0/Vulnerability-Scanner-for-Containers - https://github.com/umahari/security