vuln-list-alt/oval/c10f1/ALT-PU-2016-1250/definitions.json
2024-06-28 13:17:52 +00:00

336 lines
16 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161250",
"Version": "oval:org.altlinux.errata:def:20161250",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1250: package `thunderbird` update to version 38.7.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1250",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1250",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00744",
"RefURL": "https://bdu.fstec.ru/vul/2016-00744",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00752",
"RefURL": "https://bdu.fstec.ru/vul/2016-00752",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00754",
"RefURL": "https://bdu.fstec.ru/vul/2016-00754",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00757",
"RefURL": "https://bdu.fstec.ru/vul/2016-00757",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00758",
"RefURL": "https://bdu.fstec.ru/vul/2016-00758",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00761",
"RefURL": "https://bdu.fstec.ru/vul/2016-00761",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00764",
"RefURL": "https://bdu.fstec.ru/vul/2016-00764",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00765",
"RefURL": "https://bdu.fstec.ru/vul/2016-00765",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00766",
"RefURL": "https://bdu.fstec.ru/vul/2016-00766",
"Source": "BDU"
},
{
"RefID": "CVE-2016-1952",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1952",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1953",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1953",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1954",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1954",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1957",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1957",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1960",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1960",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1961",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1961",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1964",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1966",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1974",
"Source": "CVE"
}
],
"Description": "This update upgrades thunderbird to version 38.7.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00744: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00752: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00754: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00757: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-00758: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00761: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00764: Уязвимость почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2016-00765: Уязвимости почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00766: Уязвимости почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2016-1952: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-1953: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.\n\n * CVE-2016-1954: The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.\n\n * CVE-2016-1957: Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.\n\n * CVE-2016-1960: Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.\n\n * CVE-2016-1961: Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.\n\n * CVE-2016-1964: Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.\n\n * CVE-2016-1966: The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.\n\n * CVE-2016-1974: The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-03-15"
},
"Updated": {
"Date": "2016-03-15"
},
"BDUs": [
{
"ID": "BDU:2016-00744",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00744",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2016-00752",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00754",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-00754",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00757",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-00757",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00758",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-00758",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00761",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00761",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-00764",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00765",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00765",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "BDU:2016-00766",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00766",
"Impact": "Low",
"Public": "20160313"
}
],
"CVEs": [
{
"ID": "CVE-2016-1952",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1952",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1953",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1953",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1954",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1954",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1957",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1957",
"Impact": "Low",
"Public": "20160313"
},
{
"ID": "CVE-2016-1960",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1960",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1961",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1961",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1964",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1964",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1966",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1966",
"Impact": "High",
"Public": "20160313"
},
{
"ID": "CVE-2016-1974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1974",
"Impact": "High",
"Public": "20160313"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161250001",
"Comment": "rpm-build-thunderbird is earlier than 0:38.7.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161250002",
"Comment": "thunderbird is earlier than 0:38.7.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161250003",
"Comment": "thunderbird-devel is earlier than 0:38.7.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161250004",
"Comment": "thunderbird-enigmail is earlier than 0:38.7.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161250005",
"Comment": "thunderbird-google-calendar is earlier than 0:38.7.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161250006",
"Comment": "thunderbird-lightning is earlier than 0:38.7.0-alt1"
}
]
}
]
}
}
]
}