vuln-list-alt/oval/c10f1/ALT-PU-2015-2113/definitions.json
2024-06-28 13:17:52 +00:00

647 lines
35 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20152113",
"Version": "oval:org.altlinux.errata:def:20152113",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-2113: package `openssl098` update to version 0.9.8zh-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-2113",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-2113",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-06127",
"RefURL": "https://bdu.fstec.ru/vul/2015-06127",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06128",
"RefURL": "https://bdu.fstec.ru/vul/2015-06128",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06129",
"RefURL": "https://bdu.fstec.ru/vul/2015-06129",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06130",
"RefURL": "https://bdu.fstec.ru/vul/2015-06130",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06131",
"RefURL": "https://bdu.fstec.ru/vul/2015-06131",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09142",
"RefURL": "https://bdu.fstec.ru/vul/2015-09142",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09143",
"RefURL": "https://bdu.fstec.ru/vul/2015-09143",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09144",
"RefURL": "https://bdu.fstec.ru/vul/2015-09144",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09145",
"RefURL": "https://bdu.fstec.ru/vul/2015-09145",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09146",
"RefURL": "https://bdu.fstec.ru/vul/2015-09146",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09819",
"RefURL": "https://bdu.fstec.ru/vul/2015-09819",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09820",
"RefURL": "https://bdu.fstec.ru/vul/2015-09820",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09821",
"RefURL": "https://bdu.fstec.ru/vul/2015-09821",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09822",
"RefURL": "https://bdu.fstec.ru/vul/2015-09822",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09823",
"RefURL": "https://bdu.fstec.ru/vul/2015-09823",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09824",
"RefURL": "https://bdu.fstec.ru/vul/2015-09824",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09905",
"RefURL": "https://bdu.fstec.ru/vul/2015-09905",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09960",
"RefURL": "https://bdu.fstec.ru/vul/2015-09960",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09963",
"RefURL": "https://bdu.fstec.ru/vul/2015-09963",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09980",
"RefURL": "https://bdu.fstec.ru/vul/2015-09980",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11035",
"RefURL": "https://bdu.fstec.ru/vul/2015-11035",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11036",
"RefURL": "https://bdu.fstec.ru/vul/2015-11036",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11037",
"RefURL": "https://bdu.fstec.ru/vul/2015-11037",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11038",
"RefURL": "https://bdu.fstec.ru/vul/2015-11038",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11039",
"RefURL": "https://bdu.fstec.ru/vul/2015-11039",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01654",
"RefURL": "https://bdu.fstec.ru/vul/2016-01654",
"Source": "BDU"
},
{
"RefID": "CVE-2014-3569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3569",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3570",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3570",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3571",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3571",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3572",
"Source": "CVE"
},
{
"RefID": "CVE-2014-8275",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8275",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0204",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0204",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0209",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0286",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0287",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0288",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0289",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0293",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1791",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1792",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792",
"Source": "CVE"
},
{
"RefID": "CVE-2015-3195",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195",
"Source": "CVE"
}
],
"Description": "This update upgrades openssl098 to version 0.9.8zh-alt1. \nSecurity Fix(es):\n\n * BDU:2015-06127: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06128: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06129: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06130: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06131: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-09142: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09143: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09144: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09145: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09146: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09819: Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить целостность и доступность передаваемой защищаемой информации\n\n * BDU:2015-09820: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09821: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09822: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09823: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09824: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09905: Уязвимости системы автоматизации деятельности предприятия 1С:Предприятие, позволяющие злоумышленнику вызвать отказ в обслуживании или получить доступ к зашифрованным данным без знания ключа шифрования\n\n * BDU:2015-09960: Уязвимость программной платформы Java Platform, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения\n\n * BDU:2015-09963: Уязвимость программной платформы JRockit, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения\n\n * BDU:2015-09980: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11035: Уязвимость функции BN_GF2m_mod_inv библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11036: Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11037: Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11038: Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11039: Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-01654: Уязвимость реализации ASN1_TFLG_COMBINE библиотеки OpenSSL, позволяющая нарушителю получить защищаемую информацию из памяти процесса\n\n * CVE-2014-3569: The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.\n\n * CVE-2014-3570: The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.\n\n * CVE-2014-3571: OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.\n\n * CVE-2014-3572: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.\n\n * CVE-2014-8275: OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.\n\n * CVE-2015-0204: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.\n\n * CVE-2015-0209: Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.\n\n * CVE-2015-0286: The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.\n\n * CVE-2015-0287: The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.\n\n * CVE-2015-0288: The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.\n\n * CVE-2015-0289: The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.\n\n * CVE-2015-0293: The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.\n\n * CVE-2015-1788: The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.\n\n * CVE-2015-1789: The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.\n\n * CVE-2015-1790: The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.\n\n * CVE-2015-1791: Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.\n\n * CVE-2015-1792: The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.\n\n * CVE-2015-3195: The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-12-15"
},
"Updated": {
"Date": "2015-12-15"
},
"BDUs": [
{
"ID": "BDU:2015-06127",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06127",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06128",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06128",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06129",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06129",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06130",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06130",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06131",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06131",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09142",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-09142",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09143",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-09143",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09144",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-09144",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09145",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-09145",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09146",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-09146",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09819",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-09819",
"Impact": "Low",
"Public": "20150330"
},
{
"ID": "BDU:2015-09820",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09820",
"Impact": "High",
"Public": "20150323"
},
{
"ID": "BDU:2015-09821",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09821",
"Impact": "High",
"Public": "20150323"
},
{
"ID": "BDU:2015-09822",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09822",
"Impact": "High",
"Public": "20150323"
},
{
"ID": "BDU:2015-09823",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09823",
"Impact": "High",
"Public": "20150323"
},
{
"ID": "BDU:2015-09824",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09824",
"Impact": "High",
"Public": "20150323"
},
{
"ID": "BDU:2015-09905",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09905",
"Impact": "High",
"Public": "20131201"
},
{
"ID": "BDU:2015-09960",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09960",
"Impact": "Low",
"Public": "20150416"
},
{
"ID": "BDU:2015-09963",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09963",
"Impact": "Low",
"Public": "20150416"
},
{
"ID": "BDU:2015-09980",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-09980",
"Impact": "Low",
"Public": "20150416"
},
{
"ID": "BDU:2015-11035",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2015-11035",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "BDU:2015-11036",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11036",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "BDU:2015-11037",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2015-11037",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "BDU:2015-11038",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2015-11038",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "BDU:2015-11039",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2015-11039",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "BDU:2016-01654",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01654",
"Impact": "Low",
"Public": "20151206"
}
],
"CVEs": [
{
"ID": "CVE-2014-3569",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3569",
"Impact": "Low",
"Public": "20141224"
},
{
"ID": "CVE-2014-3570",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3570",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-3571",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3571",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-3572",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3572",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-8275",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8275",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2015-0204",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0204",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2015-0209",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-0286",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-0287",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-0288",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-0289",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-0293",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293",
"Impact": "Low",
"Public": "20150319"
},
{
"ID": "CVE-2015-1788",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "CVE-2015-1789",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789",
"Impact": "High",
"Public": "20150612"
},
{
"ID": "CVE-2015-1790",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "CVE-2015-1791",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "CVE-2015-1792",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792",
"Impact": "Low",
"Public": "20150612"
},
{
"ID": "CVE-2015-3195",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195",
"Impact": "Low",
"Public": "20151206"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20152113001",
"Comment": "libcrypto7 is earlier than 0:0.9.8zh-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20152113002",
"Comment": "libssl7 is earlier than 0:0.9.8zh-alt1"
}
]
}
]
}
}
]
}