ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-09-23 09:05:06 +00:00
parent c07ad8774d
commit 74191b0a9f
4 changed files with 68 additions and 8 deletions

View File

@ -23,9 +23,14 @@
"RefID": "ALT-PU-2018-1174",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
"Source": "ALTPU"
},
{
"RefID": "CVE-2013-2179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Source": "CVE"
}
],
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -34,9 +39,19 @@
"Date": "2018-02-12"
},
"Updated": {
"Date": "2018-02-12"
"Date": "2024-09-23"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2013-2179",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Impact": "Low",
"Public": "20131227"
}
],
"Bugzilla": [
{
"ID": "34523",

View File

@ -23,9 +23,14 @@
"RefID": "ALT-PU-2018-1174",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
"Source": "ALTPU"
},
{
"RefID": "CVE-2013-2179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Source": "CVE"
}
],
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -34,9 +39,19 @@
"Date": "2018-02-12"
},
"Updated": {
"Date": "2018-02-12"
"Date": "2024-09-23"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2013-2179",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Impact": "Low",
"Public": "20131227"
}
],
"Bugzilla": [
{
"ID": "34523",

View File

@ -28,9 +28,14 @@
"RefID": "ALT-PU-2018-1174",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
"Source": "ALTPU"
},
{
"RefID": "CVE-2013-2179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Source": "CVE"
}
],
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -39,9 +44,19 @@
"Date": "2018-02-12"
},
"Updated": {
"Date": "2018-02-12"
"Date": "2024-09-23"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2013-2179",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Impact": "Low",
"Public": "20131227"
}
],
"Bugzilla": [
{
"ID": "34523",

View File

@ -28,9 +28,14 @@
"RefID": "ALT-PU-2018-1174",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
"Source": "ALTPU"
},
{
"RefID": "CVE-2013-2179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Source": "CVE"
}
],
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -39,9 +44,19 @@
"Date": "2018-02-12"
},
"Updated": {
"Date": "2018-02-12"
"Date": "2024-09-23"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2013-2179",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
"Impact": "Low",
"Public": "20131227"
}
],
"Bugzilla": [
{
"ID": "34523",