Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-3634


methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.


Published

2014-03-01T00:55:04.857

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 2.6 (LOW)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

4.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application debian advanced_package_tool ≤ 0.8.10.3 Yes
Application debian advanced_package_tool 0.8.0 Yes
Application debian advanced_package_tool 0.8.0 Yes
Application debian advanced_package_tool 0.8.0 Yes
Application debian advanced_package_tool 0.8.1 Yes
Application debian advanced_package_tool 0.8.10 Yes
Application debian advanced_package_tool 0.8.10.1 Yes
Application debian advanced_package_tool 0.8.10.2 Yes
Operating System canonical ubuntu_linux 8.04 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 10.10 Yes
Operating System canonical ubuntu_linux 11.04 Yes

References