2024-06-28 13:17:52 +00:00

974 lines
57 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20141201",
"Version": "oval:org.altlinux.errata:def:20141201",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2014-1201: package `seamonkey` update to version 2.23-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2014-1201",
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1201",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-06136",
"RefURL": "https://bdu.fstec.ru/vul/2015-06136",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06137",
"RefURL": "https://bdu.fstec.ru/vul/2015-06137",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06138",
"RefURL": "https://bdu.fstec.ru/vul/2015-06138",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06139",
"RefURL": "https://bdu.fstec.ru/vul/2015-06139",
"Source": "BDU"
},
{
"RefID": "BDU:2015-07110",
"RefURL": "https://bdu.fstec.ru/vul/2015-07110",
"Source": "BDU"
},
{
"RefID": "BDU:2015-07111",
"RefURL": "https://bdu.fstec.ru/vul/2015-07111",
"Source": "BDU"
},
{
"RefID": "BDU:2015-07112",
"RefURL": "https://bdu.fstec.ru/vul/2015-07112",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09076",
"RefURL": "https://bdu.fstec.ru/vul/2015-09076",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09077",
"RefURL": "https://bdu.fstec.ru/vul/2015-09077",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09078",
"RefURL": "https://bdu.fstec.ru/vul/2015-09078",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09079",
"RefURL": "https://bdu.fstec.ru/vul/2015-09079",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09080",
"RefURL": "https://bdu.fstec.ru/vul/2015-09080",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09081",
"RefURL": "https://bdu.fstec.ru/vul/2015-09081",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09082",
"RefURL": "https://bdu.fstec.ru/vul/2015-09082",
"Source": "BDU"
},
{
"RefID": "CVE-2013-1701",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1701",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1702",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1704",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1704",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1705",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1708",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1709",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1710",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1711",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1711",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1713",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1713",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1714",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1717",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1717",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1718",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1719",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1719",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1720",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1721",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1721",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1722",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1722",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1723",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1724",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1725",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1726",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1728",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1730",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1732",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1735",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1736",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1737",
"Source": "CVE"
},
{
"RefID": "CVE-2013-1738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-1738",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2566",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2566",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5590",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5591",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5591",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5593",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5593",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5595",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5595",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5596",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5596",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5597",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5597",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5599",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5599",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5600",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5600",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5601",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5601",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5602",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5602",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5603",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5603",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5604",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5604",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5607",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5610",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5613",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5615",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5615",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5616",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5618",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618",
"Source": "CVE"
},
{
"RefID": "CVE-2013-5619",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5619",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6629",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6673",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6674",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6674",
"Source": "CVE"
}
],
"Description": "This update upgrades seamonkey to version 2.23-alt1. \nSecurity Fix(es):\n\n * BDU:2015-06136: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06137: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06138: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06139: Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07110: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07111: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07112: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09076: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09077: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09078: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09079: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09080: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09081: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09082: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * CVE-2013-1701: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-1702: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-1704: Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.\n\n * CVE-2013-1705: Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.\n\n * CVE-2013-1708: Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.\n\n * CVE-2013-1709: Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.\n\n * CVE-2013-1710: The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.\n\n * CVE-2013-1711: The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.\n\n * CVE-2013-1713: Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.\n\n * CVE-2013-1714: The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.\n\n * CVE-2013-1717: Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.\n\n * CVE-2013-1718: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-1719: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-1720: The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.\n\n * CVE-2013-1721: Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.\n\n * CVE-2013-1722: Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.\n\n * CVE-2013-1723: The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.\n\n * CVE-2013-1724: Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.\n\n * CVE-2013-1725: Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.\n\n * CVE-2013-1726: Mozilla Updater in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 does not ensure exclusive access to a MAR file, which allows local users to gain privileges by creating a Trojan horse file after MAR signature verification but before MAR use.\n\n * CVE-2013-1728: The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.\n\n * CVE-2013-1730: Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.\n\n * CVE-2013-1732: Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.\n\n * CVE-2013-1735: Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.\n\n * CVE-2013-1736: The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.\n\n * CVE-2013-1737: Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the \"this\" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.\n\n * CVE-2013-1738: Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.\n\n * CVE-2013-2566: The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.\n\n * CVE-2013-5590: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-5591: Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-5593: The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.\n\n * CVE-2013-5595: The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.\n\n * CVE-2013-5596: The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.\n\n * CVE-2013-5597: Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.\n\n * CVE-2013-5599: Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.\n\n * CVE-2013-5600: Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.\n\n * CVE-2013-5601: Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.\n\n * CVE-2013-5602: The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.\n\n * CVE-2013-5603: Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.\n\n * CVE-2013-5604: The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.\n\n * CVE-2013-5607: Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.\n\n * CVE-2013-5609: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-5610: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-5612: Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.\n\n * CVE-2013-5613: Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.\n\n * CVE-2013-5614: Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.\n\n * CVE-2013-5615: The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.\n\n * CVE-2013-5616: Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.\n\n * CVE-2013-5618: Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.\n\n * CVE-2013-5619: Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.\n\n * CVE-2013-6629: The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.\n\n * CVE-2013-6671: The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.\n\n * CVE-2013-6673: Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.\n\n * CVE-2013-6674: Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in an IFRAME element, a related issue to CVE-2014-2018.\n\n * MFSA 2013-10: description unavailable\n\n * MFSA 2013-11: description unavailable\n\n * MFSA 2013-76: description unavailable\n\n * MFSA 2013-77: description unavailable\n\n * MFSA 2013-78: description unavailable\n\n * MFSA 2013-79: description unavailable\n\n * MFSA 2013-80: description unavailable\n\n * MFSA 2013-81: description unavailable\n\n * MFSA 2013-82: description unavailable\n\n * MFSA 2013-83: description unavailable\n\n * MFSA 2013-85: description unavailable\n\n * MFSA 2013-88: description unavailable\n\n * MFSA 2013-89: description unavailable\n\n * MFSA 2013-90: description unavailable\n\n * MFSA 2013-91: description unavailable\n\n * MFSA 2013-92: description unavailable\n\n * MFSA 2013-93: description unavailable\n\n * MFSA 2013-94: description unavailable\n\n * MFSA 2013-95: description unavailable\n\n * MFSA 2013-96: description unavailable\n\n * MFSA 2013-97: description unavailable\n\n * MFSA 2013-98: description unavailable\n\n * #29678: crashes",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2014-02-18"
},
"Updated": {
"Date": "2014-02-18"
},
"BDUs": [
{
"ID": "BDU:2015-06136",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-06136",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-06137",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-06137",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-06138",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-06138",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-06139",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2015-06139",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-07110",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-07110",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-07111",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-07111",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-07112",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-07112",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2015-09076",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09076",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09077",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09077",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09078",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09078",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09079",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09079",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09080",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09080",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09081",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09081",
"Impact": "Low",
"Public": "20131210"
},
{
"ID": "BDU:2015-09082",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Href": "https://bdu.fstec.ru/vul/2015-09082",
"Impact": "Low",
"Public": "20131210"
}
],
"CVEs": [
{
"ID": "CVE-2013-1701",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1701",
"Impact": "Critical",
"Public": "20130807"
},
{
"ID": "CVE-2013-1702",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1702",
"Impact": "Critical",
"Public": "20130807"
},
{
"ID": "CVE-2013-1704",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1704",
"Impact": "Critical",
"Public": "20130807"
},
{
"ID": "CVE-2013-1705",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1705",
"Impact": "Critical",
"Public": "20130807"
},
{
"ID": "CVE-2013-1708",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1708",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1709",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1709",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1710",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1710",
"Impact": "Critical",
"Public": "20130807"
},
{
"ID": "CVE-2013-1711",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1711",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1713",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1713",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1714",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1717",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1717",
"Impact": "Low",
"Public": "20130807"
},
{
"ID": "CVE-2013-1718",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1718",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1719",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1719",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1720",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1720",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1721",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1721",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1722",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1722",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1723",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1723",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1724",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1724",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1725",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1725",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1726",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1726",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1728",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1728",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1730",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1730",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1732",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1732",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1735",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1735",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1736",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1736",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-1737",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1737",
"Impact": "Low",
"Public": "20130918"
},
{
"ID": "CVE-2013-1738",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-1738",
"Impact": "Critical",
"Public": "20130918"
},
{
"ID": "CVE-2013-2566",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-326",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2566",
"Impact": "Low",
"Public": "20130315"
},
{
"ID": "CVE-2013-5590",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5590",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5591",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5591",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5593",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5593",
"Impact": "Low",
"Public": "20131030"
},
{
"ID": "CVE-2013-5595",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5595",
"Impact": "Low",
"Public": "20131030"
},
{
"ID": "CVE-2013-5596",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5596",
"Impact": "Low",
"Public": "20131030"
},
{
"ID": "CVE-2013-5597",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5597",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5599",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5599",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5600",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5600",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5601",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5601",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5602",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5602",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5603",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5603",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5604",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5604",
"Impact": "Critical",
"Public": "20131030"
},
{
"ID": "CVE-2013-5607",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5607",
"Impact": "High",
"Public": "20131120"
},
{
"ID": "CVE-2013-5609",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5610",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5610",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5612",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5612",
"Impact": "Low",
"Public": "20131211"
},
{
"ID": "CVE-2013-5613",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5614",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5614",
"Impact": "Low",
"Public": "20131211"
},
{
"ID": "CVE-2013-5615",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5615",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5616",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5618",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-5619",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5619",
"Impact": "High",
"Public": "20131211"
},
{
"ID": "CVE-2013-6629",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6629",
"Impact": "Low",
"Public": "20131119"
},
{
"ID": "CVE-2013-6671",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671",
"Impact": "Critical",
"Public": "20131211"
},
{
"ID": "CVE-2013-6673",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6673",
"Impact": "Low",
"Public": "20131211"
},
{
"ID": "CVE-2013-6674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6674",
"Impact": "Low",
"Public": "20140217"
}
],
"Bugzilla": [
{
"ID": "29678",
"Href": "https://bugzilla.altlinux.org/29678",
"Data": "crashes"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20141201001",
"Comment": "rpm-build-seamonkey is earlier than 1:2.23-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141201002",
"Comment": "seamonkey is earlier than 1:2.23-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141201003",
"Comment": "seamonkey-devel is earlier than 1:2.23-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141201004",
"Comment": "seamonkey-lightning is earlier than 1:2.23-alt1"
}
]
}
]
}
}
]
}