ALT Vulnerability
This commit is contained in:
parent
c07ad8774d
commit
74191b0a9f
@ -23,9 +23,14 @@
|
||||
"RefID": "ALT-PU-2018-1174",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2013-2179",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
@ -34,9 +39,19 @@
|
||||
"Date": "2018-02-12"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2018-02-12"
|
||||
"Date": "2024-09-23"
|
||||
},
|
||||
"BDUs": null,
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2013-2179",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CWE": "CWE-310",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Impact": "Low",
|
||||
"Public": "20131227"
|
||||
}
|
||||
],
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "34523",
|
||||
|
@ -23,9 +23,14 @@
|
||||
"RefID": "ALT-PU-2018-1174",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2013-2179",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
@ -34,9 +39,19 @@
|
||||
"Date": "2018-02-12"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2018-02-12"
|
||||
"Date": "2024-09-23"
|
||||
},
|
||||
"BDUs": null,
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2013-2179",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CWE": "CWE-310",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Impact": "Low",
|
||||
"Public": "20131227"
|
||||
}
|
||||
],
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "34523",
|
||||
|
@ -28,9 +28,14 @@
|
||||
"RefID": "ALT-PU-2018-1174",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2013-2179",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
@ -39,9 +44,19 @@
|
||||
"Date": "2018-02-12"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2018-02-12"
|
||||
"Date": "2024-09-23"
|
||||
},
|
||||
"BDUs": null,
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2013-2179",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CWE": "CWE-310",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Impact": "Low",
|
||||
"Public": "20131227"
|
||||
}
|
||||
],
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "34523",
|
||||
|
@ -28,9 +28,14 @@
|
||||
"RefID": "ALT-PU-2018-1174",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1174",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2013-2179",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Description": "This update upgrades xdm to version 1.1.10-alt2. \nSecurity Fix(es):\n\n * CVE-2013-2179: X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the \"!\" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.\n\n * #34523: Ошибка обновления до текущего P8",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
@ -39,9 +44,19 @@
|
||||
"Date": "2018-02-12"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2018-02-12"
|
||||
"Date": "2024-09-23"
|
||||
},
|
||||
"BDUs": null,
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2013-2179",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CWE": "CWE-310",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2179",
|
||||
"Impact": "Low",
|
||||
"Public": "20131227"
|
||||
}
|
||||
],
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "34523",
|
||||
|
Loading…
x
Reference in New Issue
Block a user