1337 lines
68 KiB
JSON
1337 lines
68 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20192590",
|
||
"Version": "oval:org.altlinux.errata:def:20192590",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-2590: package `exiv2` update to version 0.27.2-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-2590",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2590",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00418",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00418",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04239",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04239",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04240",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04240",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04241",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04241",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04248",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04248",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04249",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04249",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01713",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01713",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01715",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01715",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02398",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02398",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02399",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02399",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01383",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01383",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01396",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01396",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01427",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01427",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01445",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01445",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01446",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01446",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01449",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01449",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01482",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01482",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01645",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01645",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01651",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01651",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-1000126",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000126",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-1000127",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000127",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-1000128",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000128",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11336",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11336",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11337",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11337",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11338",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11338",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11339",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11339",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11340",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11340",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11553",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11553",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11591",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11591",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11592",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11592",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-11683",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11683",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12955",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12955",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12956",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12956",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12957",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12957",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14857",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14857",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14858",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14858",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14859",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14859",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14860",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14860",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14861",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14861",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14862",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14862",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14863",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14863",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14864",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14864",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14865",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14865",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-14866",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14866",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17669",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17669",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17722",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17722",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17723",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17723",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17724",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17724",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17725",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17725",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-18005",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18005",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-9239",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9239",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-9953",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9953",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10772",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10772",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10780",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10780",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10958",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10958",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10998",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10998",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10999",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10999",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-11037",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11037",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-11531",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11531",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12264",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12264",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12265",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12265",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-14046",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14046",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-14338",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14338",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16336",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16336",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17229",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17229",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17230",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17230",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17282",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17282",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17581",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17581",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-19107",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19107",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-19108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-19535",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19535",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-4868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5772",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5772",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-8976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-8977",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8977",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-9145",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-9145",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13109",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13109",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14982",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14982",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades exiv2 to version 0.27.2-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00418: Уязвимость функции getData библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-04239: Уязвимость компонента types.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04240: Уязвимость компонента jp2image.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04241: Уязвимость функции Exiv2::Internal::PngChunk::parseTXTChunk библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04248: Уязвимость функции LoaderTiff::getData() библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04249: Уязвимость класса LoaderExifJpeg библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01713: Уязвимость компонента crwimage_int.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01715: Уязвимость функции Exiv2::Internal::PngChunk::parseTXTChunk библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02397: Уязвимость функции CiffDirectory::readDirectory библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02398: Уязвимость функции PngChunk::parseChunkContent библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02399: Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02400: Уязвимость компонента http.c библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01383: Уязвимость переменной класса Exiv2::IptcParser::decode файла iptc.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01396: Уязвимость функции Exiv2::getULong в types.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01397: Уязвимость функции Exiv2::StringValueBase::read в value.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01427: Уязвимость функции Exiv2::PsdImage::readMetadata файла psdimage.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с бесконечной работой цикла, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01444: Уязвимость функции Exiv2::ValueType библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01445: Уязвимость функции Internal::TiffReader::visitDirectory в tiffvisitor.cpp библиотеки для управления метаданными медиафайлов Exiv2, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01446: Уязвимость функции Exiv2::DataValue::read в value.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01449: Уязвимость функции Exiv2::Internal::PngChunk::keyTXTChunk в pngchunk_int.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01482: Уязвимость функции PngChunk::readRawProfile файла pngchunk_int.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01645: Уязвимость функции Exiv2::DataValue::toLong компонента value.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01651: Уязвимость компонента jpgimage.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-1000126: exiv2 0.26 contains a Stack out of bounds read in webp parser\n\n * CVE-2017-1000127: Exiv2 0.26 contains a heap buffer overflow in tiff parser\n\n * CVE-2017-1000128: Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser\n\n * CVE-2017-11336: There is a heap-based buffer over-read in the Image::printIFDStructure function in image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-11337: There is an invalid free in the Action::TaskFactory::cleanup function of actions.cpp in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-11338: There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-11339: There is a heap-based buffer overflow in the Image::printIFDStructure function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-11340: There is a Segmentation fault in the XmpParser::terminate() function in Exiv2 0.26, related to an exit call. A Crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-11553: There is an illegal address access in the extend_alias_table function in localealias.c of Exiv2 0.26. A crafted input will lead to remote denial of service.\n\n * CVE-2017-11591: There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.\n\n * CVE-2017-11592: There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek function of Exiv2 0.26 that will lead to a remote denial of service attack (heap memory corruption) via crafted input.\n\n * CVE-2017-11683: There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.\n\n * CVE-2017-12955: There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The vulnerability causes an out-of-bounds write in Exiv2::Image::printIFDStructure(), which may lead to remote denial of service or possibly unspecified other impact.\n\n * CVE-2017-12956: There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() in basicio.cpp of libexiv2 in Exiv2 0.26 that will lead to remote denial of service.\n\n * CVE-2017-12957: There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that is triggered in the Exiv2::Image::io function in image.cpp. It will lead to remote denial of service.\n\n * CVE-2017-14857: In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack.\n\n * CVE-2017-14858: There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.\n\n * CVE-2017-14859: An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n\n * CVE-2017-14860: There is a heap-based buffer over-read in the Exiv2::Jp2Image::readMetadata function of jp2image.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.\n\n * CVE-2017-14861: There is a stack consumption vulnerability in the Exiv2::Internal::stringFormat function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.\n\n * CVE-2017-14862: An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n\n * CVE-2017-14863: A NULL pointer dereference was discovered in Exiv2::Image::printIFDStructure in image.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n\n * CVE-2017-14864: An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.\n\n * CVE-2017-14865: There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.\n\n * CVE-2017-14866: There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.\n\n * CVE-2017-17669: There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.\n\n * CVE-2017-17722: In Exiv2 0.26, there is a reachable assertion in the readHeader function in bigtiffimage.cpp, which will lead to a remote denial of service attack via a crafted TIFF file.\n\n * CVE-2017-17723: In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file.\n\n * CVE-2017-17724: In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the \"!= 0x1c\" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.\n\n * CVE-2017-17725: In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.\n\n * CVE-2017-18005: Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF file.\n\n * CVE-2017-9239: An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.\n\n * CVE-2017-9953: There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.\n\n * CVE-2018-10772: The tEXtToDataBuf function in pngimage.cpp in Exiv2 through 0.26 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.\n\n * CVE-2018-10780: Exiv2::Image::byteSwap2 in image.cpp in Exiv2 0.26 has a heap-based buffer over-read.\n\n * CVE-2018-10958: In types.cpp in Exiv2 0.26, a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call.\n\n * CVE-2018-10998: An issue was discovered in Exiv2 0.26. readMetadata in jp2image.cpp allows remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call.\n\n * CVE-2018-10999: An issue was discovered in Exiv2 0.26. The Exiv2::Internal::PngChunk::parseTXTChunk function has a heap-based buffer over-read.\n\n * CVE-2018-11037: In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file.\n\n * CVE-2018-11531: Exiv2 0.26 has a heap-based buffer overflow in getData in preview.cpp.\n\n * CVE-2018-12264: Exiv2 0.26 has integer overflows in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp.\n\n * CVE-2018-12265: Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.\n\n * CVE-2018-14046: Exiv2 0.26 has a heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp.\n\n * CVE-2018-14338: samples/geotag.cpp in the example code of Exiv2 0.26 misuses the realpath function on POSIX platforms (other than Apple platforms) where glibc is not used, possibly leading to a buffer overflow.\n\n * CVE-2018-16336: Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.\n\n * CVE-2018-17229: Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.\n\n * CVE-2018-17230: Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.\n\n * CVE-2018-17282: An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.\n\n * CVE-2018-17581: CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.\n\n * CVE-2018-19107: In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.\n\n * CVE-2018-19108: In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.\n\n * CVE-2018-19535: In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service (application crash due to a heap-based buffer over-read) via a crafted PNG file.\n\n * CVE-2018-4868: The Exiv2::Jp2Image::readMetadata function in jp2image.cpp in Exiv2 0.26 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file.\n\n * CVE-2018-5772: In Exiv2 0.26, there is a segmentation fault caused by uncontrolled recursion in the Exiv2::Image::printIFDStructure function in the image.cpp file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file.\n\n * CVE-2018-8976: In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file.\n\n * CVE-2018-8977: In Exiv2 0.26, the Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp allows remote attackers to cause a denial of service (invalid memory access) via a crafted file.\n\n * CVE-2018-9145: In the DataBuf class in include/exiv2/types.hpp in Exiv2 0.26, an issue exists in the constructor with an initial buffer size. A large size value may lead to a SIGABRT during an attempt at memory allocation. NOTE: some third parties have been unable to reproduce the SIGABRT when using the 4-DataBuf-abort-1 PoC file.\n\n * CVE-2019-13108: An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.\n\n * CVE-2019-13109: An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.\n\n * CVE-2019-13110: A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file.\n\n * CVE-2019-13111: A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.\n\n * CVE-2019-13112: A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.\n\n * CVE-2019-13113: Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file.\n\n * CVE-2019-13114: http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.\n\n * CVE-2019-14982: In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-08-30"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-08-30"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-00418",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00418",
|
||
"Impact": "Critical",
|
||
"Public": "20180422"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04239",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04239",
|
||
"Impact": "Low",
|
||
"Public": "20180509"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04240",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-388",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04240",
|
||
"Impact": "Low",
|
||
"Public": "20180512"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04241",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04241",
|
||
"Impact": "Low",
|
||
"Public": "20180512"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04248",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04248",
|
||
"Impact": "High",
|
||
"Public": "20180613"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04249",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04249",
|
||
"Impact": "High",
|
||
"Public": "20180613"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01713",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01713",
|
||
"Impact": "Low",
|
||
"Public": "20190110"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01715",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01715",
|
||
"Impact": "Low",
|
||
"Public": "20180512"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02397",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02397",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02398",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02398",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02399",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20, CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02399",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02400",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02400",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01383",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01383",
|
||
"Impact": "Low",
|
||
"Public": "20181108"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01396",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01396",
|
||
"Impact": "Low",
|
||
"Public": "20170922"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01397",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01397",
|
||
"Impact": "Low",
|
||
"Public": "20170923"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01427",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01427",
|
||
"Impact": "Low",
|
||
"Public": "20181108"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01444",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01444",
|
||
"Impact": "High",
|
||
"Public": "20170722"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01445",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01445",
|
||
"Impact": "Low",
|
||
"Public": "20170726"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01446",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01446",
|
||
"Impact": "Low",
|
||
"Public": "20170923"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01449",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01449",
|
||
"Impact": "Low",
|
||
"Public": "20171210"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01482",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01482",
|
||
"Impact": "Low",
|
||
"Public": "20181125"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01645",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01645",
|
||
"Impact": "Low",
|
||
"Public": "20171119"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01651",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01651",
|
||
"Impact": "Low",
|
||
"Public": "20180323"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2017-1000126",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000126",
|
||
"Impact": "Low",
|
||
"Public": "20171117"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-1000127",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000127",
|
||
"Impact": "Low",
|
||
"Public": "20171117"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-1000128",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000128",
|
||
"Impact": "Low",
|
||
"Public": "20171117"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11336",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11336",
|
||
"Impact": "Low",
|
||
"Public": "20170717"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11337",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11337",
|
||
"Impact": "Low",
|
||
"Public": "20170717"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11338",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11338",
|
||
"Impact": "Low",
|
||
"Public": "20170717"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11339",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11339",
|
||
"Impact": "Low",
|
||
"Public": "20170717"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11340",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11340",
|
||
"Impact": "Low",
|
||
"Public": "20170717"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11553",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11553",
|
||
"Impact": "High",
|
||
"Public": "20170723"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11591",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11591",
|
||
"Impact": "High",
|
||
"Public": "20170724"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11592",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11592",
|
||
"Impact": "High",
|
||
"Public": "20170724"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-11683",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11683",
|
||
"Impact": "Low",
|
||
"Public": "20170727"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12955",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12955",
|
||
"Impact": "High",
|
||
"Public": "20170818"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12956",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12956",
|
||
"Impact": "Low",
|
||
"Public": "20170818"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12957",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12957",
|
||
"Impact": "Low",
|
||
"Public": "20170818"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14857",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14857",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14858",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14858",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14859",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14859",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14860",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14860",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14861",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14861",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14862",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14862",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14863",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14863",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14864",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14864",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14865",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14865",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-14866",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14866",
|
||
"Impact": "Low",
|
||
"Public": "20170929"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17669",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17669",
|
||
"Impact": "Low",
|
||
"Public": "20171213"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17722",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17722",
|
||
"Impact": "Low",
|
||
"Public": "20180212"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17723",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17723",
|
||
"Impact": "High",
|
||
"Public": "20180212"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17724",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17724",
|
||
"Impact": "Low",
|
||
"Public": "20180212"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17725",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17725",
|
||
"Impact": "Low",
|
||
"Public": "20180212"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-18005",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18005",
|
||
"Impact": "Low",
|
||
"Public": "20171231"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-9239",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9239",
|
||
"Impact": "Low",
|
||
"Public": "20170526"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-9953",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9953",
|
||
"Impact": "High",
|
||
"Public": "20170626"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10772",
|
||
"Impact": "Low",
|
||
"Public": "20180507"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10780",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10780",
|
||
"Impact": "Low",
|
||
"Public": "20180507"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10958",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10958",
|
||
"Impact": "Low",
|
||
"Public": "20180510"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10998",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10998",
|
||
"Impact": "Low",
|
||
"Public": "20180512"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10999",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10999",
|
||
"Impact": "Low",
|
||
"Public": "20180512"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-11037",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11037",
|
||
"Impact": "Low",
|
||
"Public": "20180514"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-11531",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11531",
|
||
"Impact": "Critical",
|
||
"Public": "20180529"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12264",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12264",
|
||
"Impact": "High",
|
||
"Public": "20180613"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12265",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12265",
|
||
"Impact": "High",
|
||
"Public": "20180613"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-14046",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14046",
|
||
"Impact": "High",
|
||
"Public": "20180713"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-14338",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14338",
|
||
"Impact": "High",
|
||
"Public": "20180717"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16336",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16336",
|
||
"Impact": "Low",
|
||
"Public": "20180902"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17229",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17229",
|
||
"Impact": "Low",
|
||
"Public": "20180919"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17230",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17230",
|
||
"Impact": "Low",
|
||
"Public": "20180919"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17282",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17282",
|
||
"Impact": "Low",
|
||
"Public": "20180920"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17581",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17581",
|
||
"Impact": "Low",
|
||
"Public": "20180928"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-19107",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19107",
|
||
"Impact": "Low",
|
||
"Public": "20181108"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-19108",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19108",
|
||
"Impact": "Low",
|
||
"Public": "20181108"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-19535",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19535",
|
||
"Impact": "Low",
|
||
"Public": "20181126"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-4868",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4868",
|
||
"Impact": "Low",
|
||
"Public": "20180103"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5772",
|
||
"Impact": "Low",
|
||
"Public": "20180118"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-8976",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8976",
|
||
"Impact": "Low",
|
||
"Public": "20180325"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-8977",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8977",
|
||
"Impact": "Low",
|
||
"Public": "20180325"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-9145",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-9145",
|
||
"Impact": "Low",
|
||
"Public": "20180330"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13108",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13108",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13109",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13109",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13110",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13110",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13111",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13111",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13112",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13112",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13113",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13113",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13114",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13114",
|
||
"Impact": "Low",
|
||
"Public": "20190630"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-14982",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14982",
|
||
"Impact": "Low",
|
||
"Public": "20190812"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192590001",
|
||
"Comment": "exiv2 is earlier than 0:0.27.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192590002",
|
||
"Comment": "libexiv2 is earlier than 0:0.27.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20192590003",
|
||
"Comment": "libexiv2-devel is earlier than 0:0.27.2-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |