{"id":8019,"date":"2019-01-30T10:47:05","date_gmt":"2019-01-30T10:47:05","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8019"},"modified":"2026-04-17T18:07:55","modified_gmt":"2026-04-17T18:07:55","slug":"aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/","title":{"rendered":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>1 Vulnerability Overview<\/strong><\/h2>\n<p>Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This vulnerability stems from the APT&#8217;s failure to properly handle redirects, which can be triggered via a man-in-the-middle attack or a malicious package mirror, resulting in remote code execution.<!--more--><\/p>\n<p>By changing the flag bit of the response, an attacker can redirect the download link of an installation package to a malicious server. In this case, if the attacker also changes the hash in communication data to that of the malicious package, he or she can get by the local authentication of the APT. The attacker can then trigger the vulnerability via a man-in-the-middle attack in the network environment or the mirror download server controlled by him or her, so as to execute malicious code with root privileges.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-7.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-8020 alignnone\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"483\" height=\"268\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-7.jpg 483w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-7-300x166.jpg 300w\" sizes=\"(max-width: 483px) 100vw, 483px\" \/><\/a><\/p>\n<p>Reference link:<\/p>\n<p>https:\/\/justi.cz\/security\/2019\/01\/22\/apt-rce.html<\/p>\n<h2><strong>2 Scope of Impact<\/strong><\/h2>\n<p>Affected Versions<\/p>\n<ul>\n<li>Ubuntu 18.10 apt &lt; 1.7.0ubuntu0.1<\/li>\n<li>Ubuntu 18.04 LTS apt &lt; 1.6.6ubuntu0.1<\/li>\n<li>Ubuntu 16.04 LTS apt &lt; 1.2.29ubuntu0.1<\/li>\n<li>Ubuntu 14.04 LTS apt &lt; 1.0.1ubuntu2.19<\/li>\n<li>Debian apt 1.8.0- alpha3<\/li>\n<li>Debian apt 1.4.8<\/li>\n<li>Debian apt 1.9.8.4<\/li>\n<\/ul>\n<p>Unaffected versions:<\/p>\n<ul>\n<li>Ubuntu 18.10 apt &#8211; 1.7.0ubuntu0.1<\/li>\n<li>Ubuntu 18.04 LTS apt &#8211; 1.6.6ubuntu0.1<\/li>\n<li>Ubuntu 16.04 LTS apt &#8211; 1.2.29ubuntu0.1<\/li>\n<li>Ubuntu 14.04 LTS apt &#8211; 1.0.1ubuntu2.19<\/li>\n<li>Debian apt 1.8.0- alpha3.1<\/li>\n<li>Debian apt 1.0.9.8.5<\/li>\n<li>Debian apt 1.4.9<\/li>\n<\/ul>\n<h2><strong>3 Vulnerability Check<\/strong><\/h2>\n<h3>3.1 Version Check<\/h3>\n<p>Users can run the following command to query the APT version of the current system. If the version number is within the affected range, the current system is affected by the vulnerability.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-8.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8021\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"641\" height=\"239\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-8.jpg 641w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-8-300x112.jpg 300w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/a><\/p>\n<p>Users can run the following command to query the version of Ubuntu:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-9.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8022\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"309\" height=\"37\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-9.jpg 309w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-9-300x36.jpg 300w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>4 Vulnerability Protection<\/strong><\/h2>\n<h3>4.1 Version Upgrade<\/h3>\n<p>Ubuntu and Debian have released fixes for this vulnerability. Users can upgrade to the latest APT version to protect their systems.<\/p>\n<p>For the security of the system, users are advised to disable HTTP redirect during the upgrade by running the following commands:<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8023\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"605\" height=\"68\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-10.jpg 605w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0130-10-300x34.jpg 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>Users who cannot upgrade the APT online can download an appropriate offline installation package for local installation.<\/p>\n<ul>\n<li>Debian users can refer to the following link for the upgrade:<\/li>\n<\/ul>\n<p>https:\/\/lists.debian.org\/debian-security-announce\/2019\/msg00010.html<\/p>\n<ul>\n<li>Ubuntu users can refer to the following link for the upgrade:<\/li>\n<li>https:\/\/usn.ubuntu.com\/3863-1<\/li>\n<\/ul>\n<h2>Appendix<\/h2>\n<ul>\n<li>\n<h3><strong>Statement<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<ul>\n<li>\n<h3><strong>About NSFOCUS<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com.<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Vulnerability Overview Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This vulnerability stems from the APT&#8217;s failure to properly handle redirects, which can be triggered via a man-in-the-middle attack or a malicious package mirror, resulting in remote code execution.<\/p>\n","protected":false},"author":1,"featured_media":7781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[606],"class_list":["post-8019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-rce-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Vulnerability Overview Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-30T10:47:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Vulnerability Overview Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"APT\\\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide\",\"datePublished\":\"2019-01-30T10:47:05+00:00\",\"dateModified\":\"2026-04-17T18:07:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/\"},\"wordCount\":577,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/AdobeStock_65304296_Preview.jpeg\",\"keywords\":[\"RCE Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/\",\"name\":\"APT\\\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/AdobeStock_65304296_Preview.jpeg\",\"datePublished\":\"2019-01-30T10:47:05+00:00\",\"dateModified\":\"2026-04-17T18:07:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/AdobeStock_65304296_Preview.jpeg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/AdobeStock_65304296_Preview.jpeg\",\"width\":1000,\"height\":664,\"caption\":\"Padlock on digital privacy-related text background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT\\\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS","og_description":"1 Vulnerability Overview Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This","og_url":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/","og_site_name":"NSFOCUS","article_published_time":"2019-01-30T10:47:05+00:00","article_modified_time":"2026-04-17T18:07:55+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS","twitter_description":"1 Vulnerability Overview Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide","datePublished":"2019-01-30T10:47:05+00:00","dateModified":"2026-04-17T18:07:55+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/"},"wordCount":577,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","keywords":["RCE Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/","url":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/","name":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","datePublished":"2019-01-30T10:47:05+00:00","dateModified":"2026-04-17T18:07:55+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/04\/AdobeStock_65304296_Preview.jpeg","width":1000,"height":664,"caption":"Padlock on digital privacy-related text background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/aptapt-get-rce-vulnerability-cve-2019-3462-handling-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"APT\/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8019"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8019\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7781"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}