vuln-list-alt/oval/p11/ALT-PU-2016-1836/definitions.json
2024-12-12 21:07:30 +00:00

595 lines
29 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161836",
"Version": "oval:org.altlinux.errata:def:20161836",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1836: package `firefox` update to version 48.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1836",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1836",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-01470",
"RefURL": "https://bdu.fstec.ru/vul/2016-01470",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01909",
"RefURL": "https://bdu.fstec.ru/vul/2016-01909",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01911",
"RefURL": "https://bdu.fstec.ru/vul/2016-01911",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01912",
"RefURL": "https://bdu.fstec.ru/vul/2016-01912",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01913",
"RefURL": "https://bdu.fstec.ru/vul/2016-01913",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01914",
"RefURL": "https://bdu.fstec.ru/vul/2016-01914",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01915",
"RefURL": "https://bdu.fstec.ru/vul/2016-01915",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01916",
"RefURL": "https://bdu.fstec.ru/vul/2016-01916",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01917",
"RefURL": "https://bdu.fstec.ru/vul/2016-01917",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01918",
"RefURL": "https://bdu.fstec.ru/vul/2016-01918",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01919",
"RefURL": "https://bdu.fstec.ru/vul/2016-01919",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01920",
"RefURL": "https://bdu.fstec.ru/vul/2016-01920",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01921",
"RefURL": "https://bdu.fstec.ru/vul/2016-01921",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01922",
"RefURL": "https://bdu.fstec.ru/vul/2016-01922",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01923",
"RefURL": "https://bdu.fstec.ru/vul/2016-01923",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01924",
"RefURL": "https://bdu.fstec.ru/vul/2016-01924",
"Source": "BDU"
},
{
"RefID": "CVE-2016-0718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2830",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2836",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2836",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2837",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2837",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2838",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5250",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5251",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5252",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5253",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5254",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5254",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5255",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5258",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5259",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5259",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5260",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5261",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5262",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5262",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5263",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5263",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5264",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5264",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5265",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5265",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5266",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5268",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 48.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01470: Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01909: Уязвимость браузера Firefox, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2016-01911: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к локальным файлам\n\n * BDU:2016-01912: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующую политику ограничения доступа или читать произвольные файлы\n\n * BDU:2016-01913: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01914: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01915: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01916: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01917: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01918: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01919: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01920: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01921: Уязвимость браузера Firefox, позволяющая нарушителю изменять произвольные файлы\n\n * BDU:2016-01922: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01923: Уязвимость браузера Firefox, позволяющая нарушителю подменить адресную строку\n\n * BDU:2016-01924: Уязвимость браузера Firefox, позволяющая нарушителю получить информацию о последних посещенных страницах\n\n * CVE-2016-0718: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.\n\n * CVE-2016-2830: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.\n\n * CVE-2016-2835: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2836: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.\n\n * CVE-2016-2837: Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.\n\n * CVE-2016-2838: Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.\n\n * CVE-2016-5250: Mozilla Firefox before 48.0, Firefox ESR \u003c 45.4 and Thunderbird \u003c 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.\n\n * CVE-2016-5251: Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.\n\n * CVE-2016-5252: Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.\n\n * CVE-2016-5253: The Updater in Mozilla Firefox before 48.0 on Windows allows local users to write to arbitrary files via vectors involving the callback application-path parameter and a hard link.\n\n * CVE-2016-5254: Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.\n\n * CVE-2016-5255: Use-after-free vulnerability in the js::PreliminaryObjectArray::sweep function in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code via crafted JavaScript that is mishandled during incremental garbage collection.\n\n * CVE-2016-5258: Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.\n\n * CVE-2016-5259: Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.\n\n * CVE-2016-5260: Mozilla Firefox before 48.0 mishandles changes from 'INPUT type=\"password\"' to 'INPUT type=\"text\"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.\n\n * CVE-2016-5261: Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR \u003c 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.\n\n * CVE-2016-5262: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox=\"allow-scripts\" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.\n\n * CVE-2016-5263: The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages \"type confusion.\"\n\n * CVE-2016-5264: Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.\n\n * CVE-2016-5265: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.\n\n * CVE-2016-5266: Mozilla Firefox before 48.0 does not properly restrict drag-and-drop (aka dataTransfer) actions for file: URIs, which allows user-assisted remote attackers to access local files via a crafted web site.\n\n * CVE-2016-5268: Mozilla Firefox before 48.0 does not properly set the LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags of about: URLs that are used for error pages, which makes it easier for remote attackers to conduct spoofing attacks via a crafted URL, as demonstrated by misleading text after an about:neterror?d= substring.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-08-11"
},
"Updated": {
"Date": "2016-08-11"
},
"BDUs": [
{
"ID": "BDU:2016-01470",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01470",
"Impact": "High",
"Public": "20160526"
},
{
"ID": "BDU:2016-01909",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2016-01909",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01911",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01911",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01912",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01912",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01913",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01913",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01914",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2016-01914",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01915",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2016-01915",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "BDU:2016-01916",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01916",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01917",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01917",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01918",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01918",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01919",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01919",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01920",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01920",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "BDU:2016-01921",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01921",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01922",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01922",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01923",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2016-01923",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01924",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01924",
"Impact": "Low",
"Public": "20160805"
}
],
"CVEs": [
{
"ID": "CVE-2016-0718",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718",
"Impact": "Critical",
"Public": "20160526"
},
{
"ID": "CVE-2016-2830",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2830",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-2835",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-2836",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2836",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-2837",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2837",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-2838",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2838",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5250",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5250",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5251",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5252",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5252",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5253",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5254",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5254",
"Impact": "Critical",
"Public": "20160805"
},
{
"ID": "CVE-2016-5255",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5258",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5258",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5259",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5259",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5260",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5261",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5261",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5262",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5262",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5263",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5263",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5264",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5264",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5265",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5265",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5266",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5268",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268",
"Impact": "Low",
"Public": "20160805"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161836001",
"Comment": "firefox is earlier than 0:48.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161836002",
"Comment": "i586-firefox is earlier than 0:48.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161836003",
"Comment": "rpm-build-firefox is earlier than 0:48.0-alt1"
}
]
}
]
}
}
]
}