vuln-list-alt/oval/c9f2/ALT-PU-2015-1463/definitions.json
2024-06-28 13:17:52 +00:00

273 lines
13 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151463",
"Version": "oval:org.altlinux.errata:def:20151463",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1463: package `firefox` update to version 38.0.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1463",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1463",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-11141",
"RefURL": "https://bdu.fstec.ru/vul/2015-11141",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03335",
"RefURL": "https://bdu.fstec.ru/vul/2021-03335",
"Source": "BDU"
},
{
"RefID": "CVE-2011-3079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2011-3079",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2708",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2709",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2710",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2711",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2711",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2712",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2712",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2713",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2713",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2715",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2715",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2716",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2716",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2717",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2717",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2718",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2720",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4496",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4496",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 38.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2015-11141: Уязвимости браузера Firefox, позволяющие нарушителю выполнить произвольный код\n\n * BDU:2021-03335: Уязвимость браузера Mozilla Firefox, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2011-3079: The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.\n\n * CVE-2015-2708: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2709: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2710: Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.\n\n * CVE-2015-2711: Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.\n\n * CVE-2015-2712: The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.\n\n * CVE-2015-2713: Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.\n\n * CVE-2015-2715: Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.\n\n * CVE-2015-2716: Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.\n\n * CVE-2015-2717: Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.\n\n * CVE-2015-2718: The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.\n\n * CVE-2015-2720: The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file.\n\n * CVE-2015-4496: Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-05-25"
},
"Updated": {
"Date": "2015-05-25"
},
"BDUs": [
{
"ID": "BDU:2015-11141",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2015-11141",
"Impact": "Critical",
"Public": "20150812"
},
{
"ID": "BDU:2021-03335",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-03335",
"Impact": "High",
"Public": "20150512"
}
],
"CVEs": [
{
"ID": "CVE-2011-3079",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2011-3079",
"Impact": "Critical",
"Public": "20120501"
},
{
"ID": "CVE-2015-2708",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2708",
"Impact": "High",
"Public": "20150514"
},
{
"ID": "CVE-2015-2709",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2709",
"Impact": "High",
"Public": "20150514"
},
{
"ID": "CVE-2015-2710",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2710",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2711",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2711",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2712",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2712",
"Impact": "High",
"Public": "20150514"
},
{
"ID": "CVE-2015-2713",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2713",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2715",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2715",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2716",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2716",
"Impact": "High",
"Public": "20150514"
},
{
"ID": "CVE-2015-2717",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2717",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2718",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2718",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-2720",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2720",
"Impact": "Low",
"Public": "20150514"
},
{
"ID": "CVE-2015-4496",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4496",
"Impact": "Critical",
"Public": "20150816"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151463001",
"Comment": "firefox is earlier than 0:38.0.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151463002",
"Comment": "rpm-build-firefox is earlier than 0:38.0.1-alt1"
}
]
}
]
}
}
]
}