vuln-list-alt/oval/c9f2/ALT-PU-2016-1727/definitions.json

356 lines
18 KiB
JSON
Raw Normal View History

2024-06-28 16:17:52 +03:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161727",
"Version": "oval:org.altlinux.errata:def:20161727",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1727: package `pidgin` update to version 2.11.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1727",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1727",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01653",
"RefURL": "https://bdu.fstec.ru/vul/2017-01653",
"Source": "BDU"
},
{
"RefID": "CVE-2016-1000030",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000030",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2365",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2365",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2366",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2366",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2367",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2367",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2368",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2369",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2369",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2370",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2370",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2371",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2371",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2372",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2372",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2373",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2373",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2374",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2375",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2375",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2376",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2376",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2377",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2377",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2378",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2380",
"Source": "CVE"
},
{
"RefID": "CVE-2016-4323",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4323",
"Source": "CVE"
}
],
"Description": "This update upgrades pidgin to version 2.11.0-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01653: Уязвимости программы мгновенного обмена сообщениями Pidgin, позволяющие нарушителю вызвать раскрытие памяти, а также внедрение произвольного кода\n\n * CVE-2016-1000030: Pidgin version \u003c2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.\n\n * CVE-2016-2365: A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.\n\n * CVE-2016-2366: A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.\n\n * CVE-2016-2367: An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.\n\n * CVE-2016-2368: Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.\n\n * CVE-2016-2369: A NULL pointer dereference vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a denial of service vulnerability. A malicious server can send a packet starting with a NULL byte triggering the vulnerability.\n\n * CVE-2016-2370: A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an out-of-bounds read. A malicious server or man-in-the-middle attacker can send invalid data to trigger this vulnerability.\n\n * CVE-2016-2371: An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.\n\n * CVE-2016-2372: An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.\n\n * CVE-2016-2373: A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger this vulnerability.\n\n * CVE-2016-2374: An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-07-07"
},
"Updated": {
"Date": "2016-07-07"
},
"BDUs": [
{
"ID": "BDU:2017-01653",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-01653",
"Impact": "High",
"Public": "20170107"
}
],
"CVEs": [
{
"ID": "CVE-2016-1000030",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-295",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000030",
"Impact": "Critical",
"Public": "20180905"
},
{
"ID": "CVE-2016-2365",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2365",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2366",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2366",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2367",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2367",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2368",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2368",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2369",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2369",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2370",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2370",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2371",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2371",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2372",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2372",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2373",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2373",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2374",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2374",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2375",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2375",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-2376",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2376",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2377",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2377",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2378",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2378",
"Impact": "High",
"Public": "20170106"
},
{
"ID": "CVE-2016-2380",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2380",
"Impact": "Low",
"Public": "20170106"
},
{
"ID": "CVE-2016-4323",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4323",
"Impact": "Low",
"Public": "20170106"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161727001",
"Comment": "finch is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727002",
"Comment": "finch-devel is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727003",
"Comment": "libpurple is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727004",
"Comment": "libpurple-client is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727005",
"Comment": "libpurple-dbus is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727006",
"Comment": "libpurple-devel is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727007",
"Comment": "pidgin is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727008",
"Comment": "pidgin-devel is earlier than 0:2.11.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161727009",
"Comment": "pidgin-relnot is earlier than 0:2.11.0-alt1"
}
]
}
]
}
}
]
}