Unrated severityNVD Advisory· Published Nov 3, 2014· Updated May 6, 2026
CVE-2014-0490
CVE-2014-0490
Description
The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.
Affected products
6cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*range: <=1.0.8
- cpe:2.3:a:debian:advanced_package_tool:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:1.0.7:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- ubuntu.com/usn/usn-2348-1nvdPatchVendor Advisory
- www.debian.org/security/2014/dsa-3025nvdVendor Advisory
- secunia.com/advisories/61275nvd
- secunia.com/advisories/61286nvd
News mentions
0No linked articles in our index yet.