mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 19:17:37 +02:00
32 lines
1.6 KiB
Markdown
32 lines
1.6 KiB
Markdown
### [CVE-2016-1252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1252)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html
|
|
- https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
|
|
- https://www.exploit-db.com/exploits/40916/
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/AlexRogalskiy/securecloud-image-analysis-action
|
|
- https://github.com/KorayAgaya/TrivyWeb
|
|
- https://github.com/Mohzeela/external-secret
|
|
- https://github.com/Tufin/securecloud-image-analysis-action
|
|
- https://github.com/actions-marketplace-validations/Tufin_securecloud-image-analysis-action
|
|
- https://github.com/bahramGithubRepository/CVE-Management-Tool
|
|
- https://github.com/illikainen/digestlookup
|
|
- https://github.com/jaweesh/Packet-Injection-in-Sudan-Analysis
|
|
- https://github.com/siddharthraopotukuchi/trivy
|
|
- https://github.com/simiyo/trivy
|
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
|
- https://github.com/umahari/security
|
|
|