It seems that OSSIM does not check the signature when running apt updates via network. This would allow MITM attackers to install arbitrary code when updating OSSIM. The issue seems to be already known for some time although there is no confirmation from the company AlienVault behind it. So it might be, that only the non-commercial version is affected. See http://forums.alienvault.com/discussion/512/looking-for-confirmation-of-security-issue-mitm-might-execute-arbitrary-code-on-ossim-during-update