vuln-list-alt/oval/c9f2/ALT-PU-2018-2304/definitions.json
2024-06-28 13:17:52 +00:00

227 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182304",
"Version": "oval:org.altlinux.errata:def:20182304",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2304: package `firefox-esr` update to version 60.2.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2304",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2304",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-01122",
"RefURL": "https://bdu.fstec.ru/vul/2018-01122",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01333",
"RefURL": "https://bdu.fstec.ru/vul/2018-01333",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01334",
"RefURL": "https://bdu.fstec.ru/vul/2018-01334",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04296",
"RefURL": "https://bdu.fstec.ru/vul/2019-04296",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01948",
"RefURL": "https://bdu.fstec.ru/vul/2023-01948",
"Source": "BDU"
},
{
"RefID": "CVE-2017-16541",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16541",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12376",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12376",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12377",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12377",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12378",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12379",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12381",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox-esr to version 60.2.0-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01122: Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-01333: Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения\n\n * BDU:2018-01334: Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения\n\n * BDU:2019-04296: Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01948: Уязвимость automount-демона браузеров Tor, Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности\n\n * CVE-2017-16541: Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.\n\n * CVE-2018-12376: Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12377: A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12378: A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12379: When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox \u003c 62, Firefox ESR \u003c 60.2, and Thunderbird \u003c 60.2.1.\n\n * CVE-2018-12381: Manually dragging and dropping an Outlook email message into the browser will trigger a page navigation when the message's mail columns are incorrectly interpreted as a URL. *Note: this issue only affects Windows operating systems with Outlook installed. Other operating systems are not affected.*. This vulnerability affects Firefox ESR \u003c 60.2 and Firefox \u003c 62.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-09-11"
},
"Updated": {
"Date": "2018-09-11"
},
"BDUs": [
{
"ID": "BDU:2018-01122",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2018-01122",
"Impact": "High",
"Public": "20180905"
},
{
"ID": "BDU:2018-01333",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-01333",
"Impact": "High",
"Public": "20180905"
},
{
"ID": "BDU:2018-01334",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2018-01334",
"Impact": "High",
"Public": "20180905"
},
{
"ID": "BDU:2019-04296",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04296",
"Impact": "High",
"Public": "20180905"
},
{
"ID": "BDU:2023-01948",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2023-01948",
"Impact": "Low",
"Public": "20171026"
}
],
"CVEs": [
{
"ID": "CVE-2017-16541",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16541",
"Impact": "Low",
"Public": "20171104"
},
{
"ID": "CVE-2018-12376",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12376",
"Impact": "Critical",
"Public": "20181018"
},
{
"ID": "CVE-2018-12377",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12377",
"Impact": "Critical",
"Public": "20181018"
},
{
"ID": "CVE-2018-12378",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12378",
"Impact": "Critical",
"Public": "20181018"
},
{
"ID": "CVE-2018-12379",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12379",
"Impact": "High",
"Public": "20181018"
},
{
"ID": "CVE-2018-12381",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-610",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12381",
"Impact": "Low",
"Public": "20181018"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182304001",
"Comment": "firefox-esr is earlier than 0:60.2.0-alt1"
}
]
}
]
}
}
]
}