vuln-list-alt/oval/c10f1/ALT-PU-2015-1816/definitions.json
2024-06-28 13:17:52 +00:00

727 lines
36 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151816",
"Version": "oval:org.altlinux.errata:def:20151816",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1816: package `firefox` update to version 41.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1816",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1816",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-11311",
"RefURL": "https://bdu.fstec.ru/vul/2015-11311",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11312",
"RefURL": "https://bdu.fstec.ru/vul/2015-11312",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11485",
"RefURL": "https://bdu.fstec.ru/vul/2015-11485",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11486",
"RefURL": "https://bdu.fstec.ru/vul/2015-11486",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11508",
"RefURL": "https://bdu.fstec.ru/vul/2015-11508",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11509",
"RefURL": "https://bdu.fstec.ru/vul/2015-11509",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11510",
"RefURL": "https://bdu.fstec.ru/vul/2015-11510",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11511",
"RefURL": "https://bdu.fstec.ru/vul/2015-11511",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11512",
"RefURL": "https://bdu.fstec.ru/vul/2015-11512",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11514",
"RefURL": "https://bdu.fstec.ru/vul/2015-11514",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11515",
"RefURL": "https://bdu.fstec.ru/vul/2015-11515",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11516",
"RefURL": "https://bdu.fstec.ru/vul/2015-11516",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11517",
"RefURL": "https://bdu.fstec.ru/vul/2015-11517",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11518",
"RefURL": "https://bdu.fstec.ru/vul/2015-11518",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11519",
"RefURL": "https://bdu.fstec.ru/vul/2015-11519",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11521",
"RefURL": "https://bdu.fstec.ru/vul/2015-11521",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11522",
"RefURL": "https://bdu.fstec.ru/vul/2015-11522",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11523",
"RefURL": "https://bdu.fstec.ru/vul/2015-11523",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11524",
"RefURL": "https://bdu.fstec.ru/vul/2015-11524",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11525",
"RefURL": "https://bdu.fstec.ru/vul/2015-11525",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11526",
"RefURL": "https://bdu.fstec.ru/vul/2015-11526",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11532",
"RefURL": "https://bdu.fstec.ru/vul/2015-11532",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11533",
"RefURL": "https://bdu.fstec.ru/vul/2015-11533",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11534",
"RefURL": "https://bdu.fstec.ru/vul/2015-11534",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11535",
"RefURL": "https://bdu.fstec.ru/vul/2015-11535",
"Source": "BDU"
},
{
"RefID": "CVE-2015-4497",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4497",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4498",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4498",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4500",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4500",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4501",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4501",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4502",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4502",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4503",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4503",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4504",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4504",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4506",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4506",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4507",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4507",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4508",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4508",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4509",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4509",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4510",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4510",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4511",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4516",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4516",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4517",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4517",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4519",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4519",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4520",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4520",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4521",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4522",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4522",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7174",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7174",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7175",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7175",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7176",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7176",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7177",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7180",
"Source": "CVE"
},
{
"RefID": "CVE-2015-7327",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7327",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 41.0-alt1. \nSecurity Fix(es):\n\n * BDU:2015-11311: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11312: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти процедуру подтверждения действий пользователем при установке обновления\n\n * BDU:2015-11485: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11486: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2015-11508: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-11509: Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-11510: Уязвимость браузера Firefox, позволяющая нарушителю обойти ограничения доступа к элементам окна\n\n * BDU:2015-11511: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации из памяти процесса\n\n * BDU:2015-11512: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2015-11514: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11515: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-11516: Уязвимость браузера Firefox, позволяющая нарушителю подменить содержимое окна\n\n * BDU:2015-11517: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11518: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11519: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11521: Уязвимость браузера Firefox, позволяющая нарушителю обойти механизм защиты ECMAScript 5 (ES5) API и выполнить произвольный код\n\n * BDU:2015-11522: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11523: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения доступа и выполнить переход по заданному URL\n\n * BDU:2015-11524: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти механизм защиты CORS\n\n * BDU:2015-11525: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11526: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11532: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11533: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11534: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11535: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2015-4497: Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.\n\n * CVE-2015-4498: The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.\n\n * CVE-2015-4500: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-4501: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-4502: js/src/proxy/Proxy.cpp in Mozilla Firefox before 41.0 mishandles certain receiver arguments, which allows remote attackers to bypass intended window access restrictions via a crafted web site.\n\n * CVE-2015-4503: The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.\n\n * CVE-2015-4504: The lut_inverse_interp16 function in the QCMS library in Mozilla Firefox before 41.0 allows remote attackers to obtain sensitive information or cause a denial of service (buffer over-read and application crash) via crafted attributes in the ICC 4 profile of an image.\n\n * CVE-2015-4506: Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.\n\n * CVE-2015-4507: The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.\n\n * CVE-2015-4508: Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.\n\n * CVE-2015-4509: Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.\n\n * CVE-2015-4510: Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.\n\n * CVE-2015-4511: Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.\n\n * CVE-2015-4516: Mozilla Firefox before 41.0 allows remote attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable properties, and consequently execute arbitrary JavaScript code with chrome privileges, via a crafted web page that does not use ES5 APIs.\n\n * CVE-2015-4517: NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-4519: Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.\n\n * CVE-2015-4520: Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.\n\n * CVE-2015-4521: The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-4522: The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an \"overflow.\"\n\n * CVE-2015-7174: The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an \"overflow.\"\n\n * CVE-2015-7175: The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an \"overflow.\"\n\n * CVE-2015-7176: The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-7177: The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-7180: The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-7327: Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-09-29"
},
"Updated": {
"Date": "2015-09-29"
},
"BDUs": [
{
"ID": "BDU:2015-11311",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11311",
"Impact": "Critical",
"Public": "20150829"
},
{
"ID": "BDU:2015-11312",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11312",
"Impact": "High",
"Public": "20150829"
},
{
"ID": "BDU:2015-11485",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11485",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11486",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-11486",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11508",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11508",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11509",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11509",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11510",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11510",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11511",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-11511",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11512",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11512",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11514",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11514",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11515",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-11515",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11516",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11516",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11517",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11517",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11518",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2015-11518",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11519",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11519",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11521",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11521",
"Impact": "Critical",
"Public": "20150924"
},
{
"ID": "BDU:2015-11522",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11522",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11523",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-11523",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11524",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11524",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "BDU:2015-11525",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11525",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11526",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11526",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11532",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11532",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11533",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11533",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11534",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11534",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "BDU:2015-11535",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11535",
"Impact": "High",
"Public": "20150924"
}
],
"CVEs": [
{
"ID": "CVE-2015-4497",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4497",
"Impact": "Critical",
"Public": "20150829"
},
{
"ID": "CVE-2015-4498",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4498",
"Impact": "High",
"Public": "20150829"
},
{
"ID": "CVE-2015-4500",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4500",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-4501",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4501",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-4502",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4502",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4503",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4503",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4504",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4504",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4506",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4506",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4507",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4507",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4508",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4508",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4509",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4509",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-4510",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4510",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4511",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4511",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4516",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4516",
"Impact": "Critical",
"Public": "20150924"
},
{
"ID": "CVE-2015-4517",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4517",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-4519",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4519",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4520",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4520",
"Impact": "Low",
"Public": "20150924"
},
{
"ID": "CVE-2015-4521",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4521",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-4522",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4522",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7174",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7174",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7175",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7175",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7176",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7176",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7177",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7177",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7180",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7180",
"Impact": "High",
"Public": "20150924"
},
{
"ID": "CVE-2015-7327",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7327",
"Impact": "Low",
"Public": "20150924"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151816001",
"Comment": "firefox is earlier than 0:41.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151816002",
"Comment": "rpm-build-firefox is earlier than 0:41.0-alt1"
}
]
}
]
}
}
]
}