655 lines
34 KiB
JSON
655 lines
34 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20201092",
|
|
"Version": "oval:org.altlinux.errata:def:20201092",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2020-1092: package `zoneminder` update to version 1.34.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2020-1092",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1092",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2023-01737",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2023-01737",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-13072",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13072",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-6777",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6777",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-6990",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6990",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-6991",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6991",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-6992",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6992",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7325",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7325",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7326",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7326",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7327",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7327",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7328",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7328",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7329",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7329",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7330",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7330",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7331",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7331",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7332",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7332",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7333",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7333",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7334",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7334",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7335",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7335",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7336",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7336",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7337",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7337",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7338",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7338",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7339",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7339",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7340",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7340",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7341",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7341",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7342",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7342",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7343",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7343",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7344",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7344",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7345",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7345",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7346",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7346",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7347",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7347",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7348",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7348",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7349",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7349",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7350",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7350",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7351",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7351",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-7352",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7352",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8423",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8423",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8424",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8424",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8425",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8425",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8426",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8426",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8427",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8427",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8428",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8428",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-8429",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8429",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades zoneminder to version 1.34.0-alt1. \nSecurity Fix(es):\n\n * BDU:2023-01737: Уязвимость функции zmLoadUser() (zm_user.cpp) программного обеспечения для организации видеонаблюдения ZoneMinder, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2019-13072: Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page.\n\n * CVE-2019-6777: An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter.\n\n * CVE-2019-6990: A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones\u0026action=zoneImage\u0026mid=1 URI.\n\n * CVE-2019-6991: A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username.\n\n * CVE-2019-6992: A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI.\n\n * CVE-2019-7325: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as multiple views under web/skins/classic/views insecurely utilize $_REQUEST['PHP_SELF'], without applying any proper filtration.\n\n * CVE-2019-7326: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Host' parameter value in the view console (console.php) because proper filtration is omitted. This relates to the index.php?view=monitor Host Name field.\n\n * CVE-2019-7327: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted.\n\n * CVE-2019-7328: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) via /js/frame.js.php because proper filtration is omitted.\n\n * CVE-2019-7329: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the form action on multiple views utilizes $_SERVER['PHP_SELF'] insecurely, mishandling any arbitrary input appended to the webroot URL, without any proper filtration, leading to XSS.\n\n * CVE-2019-7330: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'show' parameter value in the view frame (frame.php) because proper filtration is omitted.\n\n * CVE-2019-7331: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 while editing an existing monitor field named \"signal check color\" (monitor.php). There exists no input validation or output filtration, leaving it vulnerable to HTML Injection and an XSS attack.\n\n * CVE-2019-7332: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'eid' (aka Event ID) parameter value in the view download (download.php) because proper filtration is omitted.\n\n * CVE-2019-7333: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view download (download.php) because proper filtration is omitted.\n\n * CVE-2019-7334: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view export (export.php) because proper filtration is omitted.\n\n * CVE-2019-7335: Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'log' as it insecurely prints the 'Log Message' value on the web page without applying any proper filtration. This relates to the view=logs value.\n\n * CVE-2019-7336: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view _monitor_filters.php contains takes in input from the user and saves it into the session, and retrieves it later (insecurely). The values of the MonitorName and Source parameters are being displayed without any output filtration being applied. This relates to the view=cycle value.\n\n * CVE-2019-7337: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration.\n\n * CVE-2019-7338: Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'group' as it insecurely prints the 'Group Name' value on the web page without applying any proper filtration.\n\n * CVE-2019-7339: POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'level' parameter value in the view log (log.php) because proper filtration is omitted.\n\n * CVE-2019-7340: POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted.\n\n * CVE-2019-7341: Reflected - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[LinkedMonitors]' parameter value in the view monitor (monitor.php) because proper filtration is omitted.\n\n * CVE-2019-7342: POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[AutoExecuteCmd]' parameter value in the view filter (filter.php) because proper filtration is omitted.\n\n * CVE-2019-7343: Reflected - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[Method]' parameter value in the view monitor (monitor.php) because proper filtration is omitted.\n\n * CVE-2019-7344: Reflected XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'filter' as it insecurely prints the 'filter[Name]' (aka Filter name) value on the web page without applying any proper filtration.\n\n * CVE-2019-7345: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view 'options' (options.php) does no input validation for the WEB_TITLE, HOME_URL, HOME_CONTENT, or WEB_CONSOLE_BANNER value, allowing an attacker to execute HTML or JavaScript code. This relates to functions.php.\n\n * CVE-2019-7346: A CSRF check issue exists in ZoneMinder through 1.32.3 as whenever a CSRF check fails, a callback function is called displaying a \"Try again\" button, which allows resending the failed request, making the CSRF attack successful.\n\n * CVE-2019-7347: A Time-of-check Time-of-use (TOCTOU) Race Condition exists in ZoneMinder through 1.32.3 as a session remains active for an authenticated user even after deletion from the users table. This allows a nonexistent user to access and modify records (add/delete Monitors, Users, etc.).\n\n * CVE-2019-7348: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'username' parameter value in the view user (user.php) because proper filtration is omitted.\n\n * CVE-2019-7349: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[V4LCapturesPerFrame]' parameter value in the view monitor (monitor.php) because proper filtration is omitted.\n\n * CVE-2019-7350: Session fixation exists in ZoneMinder through 1.32.3, as an attacker can fixate his own session cookies to the next logged-in user, thereby hijacking the victim's account. This occurs because a set of multiple cookies (between 3 and 5) is being generated when a user successfully logs in, and these sets overlap for successive logins.\n\n * CVE-2019-7351: Log Injection exists in ZoneMinder through 1.32.3, as an attacker can entice the victim to visit a specially crafted link, which in turn will inject a custom Log message provided by the attacker in the 'log' view page, as demonstrated by the message=User%20'admin'%20Logged%20in value.\n\n * CVE-2019-7352: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view 'state' (aka Run State) (state.php) does no input validation to the value supplied to the 'New State' (aka newState) field, allowing an attacker to execute HTML or JavaScript code.\n\n * CVE-2019-8423: ZoneMinder through 1.32.3 has SQL Injection via the skins/classic/views/events.php filter[Query][terms][0][cnj] parameter.\n\n * CVE-2019-8424: ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php sort parameter.\n\n * CVE-2019-8425: includes/database.php in ZoneMinder before 1.32.3 has XSS in the construction of SQL-ERR messages.\n\n * CVE-2019-8426: skins/classic/views/controlcap.php in ZoneMinder before 1.32.3 has XSS via the newControl array, as demonstrated by the newControl[MinTiltRange] parameter.\n\n * CVE-2019-8427: daemonControl in includes/functions.php in ZoneMinder before 1.32.3 allows command injection via shell metacharacters.\n\n * CVE-2019-8428: ZoneMinder before 1.32.3 has SQL Injection via the skins/classic/views/control.php groupSql parameter, as demonstrated by a newGroup[MonitorIds][] value.\n\n * CVE-2019-8429: ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php filter[Query][terms][0][cnj] parameter.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2020-01-24"
|
|
},
|
|
"Updated": {
|
|
"Date": "2020-01-24"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2023-01737",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-121, CWE-787",
|
|
"Href": "https://bdu.fstec.ru/vul/2023-01737",
|
|
"Impact": "Critical",
|
|
"Public": "20190128"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2019-13072",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13072",
|
|
"Impact": "Low",
|
|
"Public": "20190630"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-6777",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6777",
|
|
"Impact": "Low",
|
|
"Public": "20190124"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-6990",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6990",
|
|
"Impact": "Low",
|
|
"Public": "20190128"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-6991",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6991",
|
|
"Impact": "Critical",
|
|
"Public": "20190128"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-6992",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6992",
|
|
"Impact": "Low",
|
|
"Public": "20190128"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7325",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7325",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7326",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7326",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7327",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7327",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7328",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7328",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7329",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7329",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7330",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7330",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7331",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7331",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7332",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7332",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7333",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7333",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7334",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7334",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7335",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7335",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7336",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7336",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7337",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7337",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7338",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7338",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7339",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7339",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7340",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7340",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7341",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7341",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7342",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7342",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7343",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7343",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7344",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7344",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7345",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7345",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7346",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7346",
|
|
"Impact": "High",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7347",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-367",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7347",
|
|
"Impact": "High",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7348",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7348",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7349",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7349",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7350",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-384",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7350",
|
|
"Impact": "High",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7351",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-74",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7351",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-7352",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7352",
|
|
"Impact": "Low",
|
|
"Public": "20190204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8423",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8423",
|
|
"Impact": "Critical",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8424",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8424",
|
|
"Impact": "Critical",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8425",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8425",
|
|
"Impact": "Low",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8426",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8426",
|
|
"Impact": "Low",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8427",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-78",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8427",
|
|
"Impact": "Critical",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8428",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8428",
|
|
"Impact": "Critical",
|
|
"Public": "20190218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-8429",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-89",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8429",
|
|
"Impact": "Critical",
|
|
"Public": "20190218"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20201092001",
|
|
"Comment": "zoneminder is earlier than 0:1.34.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20201092002",
|
|
"Comment": "zoneminder-api is earlier than 0:1.34.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20201092003",
|
|
"Comment": "zoneminder-nginx is earlier than 0:1.34.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |