vuln-list-alt/oval/c9f2/ALT-PU-2018-2751/definitions.json
2024-06-28 13:17:52 +00:00

166 lines
6.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182751",
"Version": "oval:org.altlinux.errata:def:20182751",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2751: package `openslp` update to version 2.0.0-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2751",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2751",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-01499",
"RefURL": "https://bdu.fstec.ru/vul/2018-01499",
"Source": "BDU"
},
{
"RefID": "CVE-2012-4428",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2012-4428",
"Source": "CVE"
},
{
"RefID": "CVE-2016-4912",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4912",
"Source": "CVE"
},
{
"RefID": "CVE-2016-7567",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7567",
"Source": "CVE"
},
{
"RefID": "CVE-2017-17833",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17833",
"Source": "CVE"
}
],
"Description": "This update upgrades openslp to version 2.0.0-alt2. \nSecurity Fix(es):\n\n * BDU:2018-01499: Уязвимость пакета openslp-dfsg, связаннная с ошибками работы с памятью, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность\n\n * CVE-2012-4428: openslp: SLPIntersectStringList()' Function has a DoS vulnerability\n\n * CVE-2016-4912: The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.\n\n * CVE-2016-7567: Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.\n\n * CVE-2017-17833: OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.\n\n * #35692: Gssproxy tests failed against libopenslp-2.0.0-alt1",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-12-01"
},
"Updated": {
"Date": "2018-12-01"
},
"BDUs": [
{
"ID": "BDU:2018-01499",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-01499",
"Impact": "Critical",
"Public": "20180409"
}
],
"CVEs": [
{
"ID": "CVE-2012-4428",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2012-4428",
"Impact": "High",
"Public": "20191202"
},
{
"ID": "CVE-2016-4912",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4912",
"Impact": "High",
"Public": "20170327"
},
{
"ID": "CVE-2016-7567",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7567",
"Impact": "Critical",
"Public": "20170123"
},
{
"ID": "CVE-2017-17833",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17833",
"Impact": "Critical",
"Public": "20180423"
}
],
"Bugzilla": [
{
"ID": "35692",
"Href": "https://bugzilla.altlinux.org/35692",
"Data": "Gssproxy tests failed against libopenslp-2.0.0-alt1"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182751001",
"Comment": "libopenslp is earlier than 0:2.0.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182751002",
"Comment": "libopenslp-devel is earlier than 0:2.0.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182751003",
"Comment": "openslp is earlier than 0:2.0.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182751004",
"Comment": "openslp-daemon is earlier than 0:2.0.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182751005",
"Comment": "openslp-doc is earlier than 0:2.0.0-alt2"
}
]
}
]
}
}
]
}