943 lines
48 KiB
JSON
943 lines
48 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20141407",
|
|
"Version": "oval:org.altlinux.errata:def:20141407",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2014-1407: package `firefox` update to version 28.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p10"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2014-1407",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1407",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00228",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00228",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00229",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00229",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00230",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00230",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00231",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00231",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00241",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00241",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00242",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00242",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00243",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00243",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00244",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00244",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00247",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00247",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00248",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00248",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00249",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00249",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00250",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00250",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00251",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00251",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00252",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00252",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00253",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00253",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00254",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00254",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00261",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00261",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00262",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00262",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00263",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00263",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00264",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00264",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00269",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00269",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00270",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00270",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00272",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00272",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00273",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00273",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00276",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00276",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00277",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00277",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00278",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00278",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00279",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00279",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00280",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00280",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00281",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00281",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00282",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00282",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00283",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00283",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00290",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00290",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00291",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00291",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00292",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00292",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00293",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00293",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00305",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00305",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00306",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00306",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00307",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00307",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00308",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00308",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00309",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00309",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00310",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00310",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00311",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00311",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00312",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00312",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00314",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00314",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00315",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00315",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6167",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6167",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1493",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1494",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1494",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1496",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1496",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1497",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1498",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1498",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1499",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1499",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1500",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1500",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1502",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1502",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1504",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1504",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1505",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1508",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1509",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1510",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1511",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1512",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1513",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1514",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades firefox to version 28.0-alt1. \nSecurity Fix(es):\n\n * BDU:2014-00228: Уязвимость браузера Firefox, позволяющая локальным пользователям повысить уровень своих привилегий\n\n * BDU:2014-00229: Уязвимость браузера Firefox ESR, позволяющая локальным пользователям повысить уровень своих привилегий\n\n * BDU:2014-00230: Уязвимость почтового клиента Thunderbird, позволяющая локальным пользователям повысить уровень своих привилегий\n\n * BDU:2014-00231: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая локальным пользователям повысить уровень своих привилегий\n\n * BDU:2014-00241: Уязвимость браузера Firefox, позволяющая злоумышленнику получить доступ к конфиденциальной информации\n\n * BDU:2014-00242: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику получить доступ к конфиденциальной информации\n\n * BDU:2014-00243: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику получить доступ к конфиденциальной информации\n\n * BDU:2014-00244: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику получить доступ к конфиденциальной информации\n\n * BDU:2014-00247: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00248: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00249: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00250: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00251: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00252: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00253: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00254: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00261: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00262: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00263: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00264: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00269: Уязвимость браузера Firefox, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00270: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00272: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить обход правил ограничения\n\n * BDU:2014-00273: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить обход правил ограничения\n\n * BDU:2014-00276: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00277: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00278: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00279: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2014-00280: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00281: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00282: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00283: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00290: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00291: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00292: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00293: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00305: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00306: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00307: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00308: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код, получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2014-00309: Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00310: Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00311: Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00312: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код\n\n * BDU:2014-00314: Уязвимость браузера Firefox, позволяющая провести межсайтовое выполнение сценариев\n\n * BDU:2014-00315: Уязвимость пакета программ Mozilla SeaMonkey, позволяющая провести межсайтовое выполнение сценариев\n\n * CVE-2013-6167: Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.\n\n * CVE-2014-1493: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2014-1494: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2014-1496: Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.\n\n * CVE-2014-1497: The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.\n\n * CVE-2014-1498: The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.\n\n * CVE-2014-1499: Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.\n\n * CVE-2014-1500: Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.\n\n * CVE-2014-1502: The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.\n\n * CVE-2014-1504: The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.\n\n * CVE-2014-1505: The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.\n\n * CVE-2014-1508: The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.\n\n * CVE-2014-1509: Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.\n\n * CVE-2014-1510: The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.\n\n * CVE-2014-1511: Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.\n\n * CVE-2014-1512: Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.\n\n * CVE-2014-1513: TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.\n\n * CVE-2014-1514: vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.\n\n * MFSA 2014-15: description unavailable\n\n * MFSA 2014-16: description unavailable\n\n * MFSA 2014-17: description unavailable\n\n * MFSA 2014-18: description unavailable\n\n * MFSA 2014-19: description unavailable\n\n * MFSA 2014-20: description unavailable\n\n * MFSA 2014-21: description unavailable\n\n * MFSA 2014-22: description unavailable\n\n * MFSA 2014-23: description unavailable\n\n * MFSA 2014-24: description unavailable\n\n * MFSA 2014-25: description unavailable\n\n * MFSA 2014-26: description unavailable\n\n * MFSA 2014-27: description unavailable\n\n * MFSA 2014-28: description unavailable\n\n * MFSA 2014-29: description unavailable\n\n * MFSA 2014-30: description unavailable\n\n * MFSA 2014-31: description unavailable\n\n * MFSA 2014-32: description unavailable",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2014-03-30"
|
|
},
|
|
"Updated": {
|
|
"Date": "2014-03-30"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2014-00228",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00228",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00229",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00229",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00230",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00230",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00231",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00231",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00241",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00241",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00242",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00242",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00243",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00243",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00244",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00244",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00247",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00247",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00248",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00248",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00249",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00249",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00250",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00250",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00251",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00251",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00252",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00252",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00253",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00253",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00254",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00254",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00261",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00261",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00262",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00262",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00263",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00263",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00264",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00264",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00269",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00269",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00270",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00270",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00272",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00272",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00273",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00273",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00276",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00276",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00277",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00277",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00278",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00278",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00279",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00279",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00280",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00280",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00281",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00281",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00282",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00282",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00283",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00283",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00290",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00290",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00291",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00291",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00292",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00292",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00293",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00293",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00305",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00305",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00306",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00306",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00307",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00307",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00308",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00308",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00309",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00309",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00310",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00310",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00311",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00311",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00312",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00312",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00314",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00314",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00315",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00315",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-6167",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6167",
|
|
"Impact": "Low",
|
|
"Public": "20140215"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1493",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1493",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1494",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1494",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1496",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1496",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1497",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1497",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1498",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-347",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1498",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1499",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1499",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1500",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1500",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1502",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-346",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1502",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1504",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1504",
|
|
"Impact": "Low",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1505",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1505",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1508",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1508",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1509",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1509",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1510",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1510",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1511",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1511",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1512",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1512",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1513",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1513",
|
|
"Impact": "High",
|
|
"Public": "20140319"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1514",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1514",
|
|
"Impact": "Critical",
|
|
"Public": "20140319"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:10",
|
|
"cpe:/o:alt:workstation:10",
|
|
"cpe:/o:alt:server:10",
|
|
"cpe:/o:alt:server-v:10",
|
|
"cpe:/o:alt:education:10",
|
|
"cpe:/o:alt:slinux:10",
|
|
"cpe:/o:alt:starterkit:p10",
|
|
"cpe:/o:alt:kworkstation:10.1",
|
|
"cpe:/o:alt:workstation:10.1",
|
|
"cpe:/o:alt:server:10.1",
|
|
"cpe:/o:alt:server-v:10.1",
|
|
"cpe:/o:alt:education:10.1",
|
|
"cpe:/o:alt:slinux:10.1",
|
|
"cpe:/o:alt:starterkit:10.1",
|
|
"cpe:/o:alt:kworkstation:10.2",
|
|
"cpe:/o:alt:workstation:10.2",
|
|
"cpe:/o:alt:server:10.2",
|
|
"cpe:/o:alt:server-v:10.2",
|
|
"cpe:/o:alt:education:10.2",
|
|
"cpe:/o:alt:slinux:10.2",
|
|
"cpe:/o:alt:starterkit:10.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20141407001",
|
|
"Comment": "firefox is earlier than 0:28.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20141407002",
|
|
"Comment": "rpm-build-firefox is earlier than 0:28.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |