874 lines
42 KiB
JSON
874 lines
42 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20162445",
|
|
"Version": "oval:org.altlinux.errata:def:20162445",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-2445: package `adobe-flash-player-ppapi` update to version 24-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-2445",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-2445",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02375",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02375",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02376",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02376",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02378",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02378",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02379",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02379",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02380",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02380",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02381",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02381",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02382",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02382",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02383",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02383",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02384",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02384",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02385",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02385",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02386",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02386",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02387",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02387",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02388",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02388",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02389",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02389",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02390",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02390",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02391",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02391",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02392",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02392",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00010",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00010",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00011",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00011",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00012",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00012",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00013",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00013",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00014",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00014",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00015",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00015",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00016",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00016",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00017",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00017",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00018",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00018",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00019",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00019",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00020",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00020",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00021",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00021",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00022",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00022",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00023",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00023",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00024",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00024",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00025",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00025",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00026",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00026",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00027",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00027",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00030",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00030",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00032",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00032",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00033",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00033",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00034",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00034",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00035",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00035",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00036",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00036",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00037",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00037",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-00038",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-00038",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7867",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7867",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7868",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7868",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7869",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7869",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7870",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7870",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7871",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7871",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7872",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7872",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7873",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7873",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7874",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7874",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7875",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7875",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7876",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7876",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7877",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7877",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7878",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7878",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7879",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7879",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7880",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7880",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7881",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7881",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7890",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7890",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7892",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7892",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades adobe-flash-player-ppapi to version 24-alt1. \nSecurity Fix(es):\n\n * BDU:2016-02375: Уязвимость программных платформ Flash Player и Flash Player for Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02376: Уязвимость программной платформы Flash Player, позволяющая нарушителю обойти механизм защиты\n\n * BDU:2016-02378: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02379: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02380: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02381: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02382: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02383: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02384: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02385: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02386: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2016-02387: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02388: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02389: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02390: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02391: Уязвимость программной платформы Flash Player позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-02392: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00010: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00011: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00012: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00013: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00014: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00015: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00016: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00017: Уязвимость программной платформы Flash Player, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации\n\n * BDU:2017-00018: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00019: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00020: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00021: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00022: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00023: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00024: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00025: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00026: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00027: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00030: Уязвимость программной платформы Flash Player, позволяющая нарушителю обойти механизм защиты\n\n * BDU:2017-00032: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00033: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00034: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00035: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00036: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00037: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00038: Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2016-7867: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7868: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7869: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to backtrack search functionality. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7870: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7871: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7872: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class related to objects at multiple presentation levels. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7873: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7874: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7875: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7876: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Clipboard class related to data handling functionality. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7877: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the Action Message Format serialization (AFM0). Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7878: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the PSDK's MediaPlayer class. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7879: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7880: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability when setting the length property of an array object. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7881: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution.\n\n * CVE-2016-7890: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have security bypass vulnerability in the implementation of the same origin policy.\n\n * CVE-2016-7892: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-12-15"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-12-15"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-02375",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02375",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02376",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02376",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02378",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02378",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02379",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02379",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02380",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02380",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02381",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02381",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02382",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02382",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02383",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02383",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02384",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02384",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02385",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02385",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02386",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02386",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02387",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02387",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02388",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02388",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02389",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02389",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02390",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02390",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02391",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02391",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02392",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02392",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00010",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00010",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00011",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00011",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00012",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00012",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00013",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00013",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00014",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00014",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00015",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-124",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00015",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00016",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00016",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00017",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00017",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00018",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00018",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00019",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00019",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00020",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00020",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00021",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00021",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00022",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00022",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00023",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00023",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00024",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00024",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00025",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00025",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00026",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00026",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00027",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00027",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00030",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00030",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00032",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00032",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00033",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00033",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00034",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00034",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00035",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00035",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00036",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00036",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00037",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00037",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-00038",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-00038",
|
|
"Impact": "Critical",
|
|
"Public": "20161215"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2016-7867",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7867",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7868",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7868",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7869",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7869",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7870",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7870",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7871",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7871",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7872",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7872",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7873",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7873",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7874",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7874",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7875",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7875",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7876",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7876",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7877",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7877",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7878",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7878",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7879",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7879",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7880",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7880",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7881",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7881",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7890",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7890",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7892",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7892",
|
|
"Impact": "High",
|
|
"Public": "20161215"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162445001",
|
|
"Comment": "i586-ppapi-plugin-adobe-flash is earlier than 3:24.0.0.186-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162445002",
|
|
"Comment": "ppapi-plugin-adobe-flash is earlier than 3:24.0.0.186-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |