All the vulnerabilites related to gnome - gnome
cve-2015-7216
Vulnerability from cvelistv5
Published
2015-12-16 11:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201512-10 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html | vendor-advisory, x_refsource_FEDORA | |
http://www.ubuntu.com/usn/USN-2833-1 | vendor-advisory, x_refsource_UBUNTU | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1197059 | x_refsource_CONFIRM | |
http://www.mozilla.org/security/announce/2015/mfsa2015-143.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/79278 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id/1034426 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:45.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201512-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034426" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T20:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201512-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034426" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2015-7216", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201512-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "name": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034426" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2015-7216", "datePublished": "2015-12-16T11:00:00", "dateReserved": "2015-09-16T00:00:00", "dateUpdated": "2024-08-06T07:43:45.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3533
Vulnerability from cvelistv5
Published
2008-08-18 17:15
Modified
2024-08-07 09:45
Severity ?
EPSS score ?
Summary
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890" }, { "name": "31465", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31465" }, { "name": "30690", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30690" }, { "name": "SUSE-SR:2008:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31620" }, { "name": "USN-638-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-638-1" }, { "name": "32629", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32629" }, { "name": "yelp-uri-format-string(44449)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860" }, { "name": "31834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31834" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364" }, { "name": "ADV-2008-2393", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2393" }, { "name": "FEDORA-2008-7293", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html" }, { "name": "MDVSA-2008:175", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890" }, { "name": "31465", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31465" }, { "name": "30690", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30690" }, { "name": "SUSE-SR:2008:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31620" }, { "name": "USN-638-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-638-1" }, { "name": "32629", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32629" }, { "name": "yelp-uri-format-string(44449)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860" }, { "name": "31834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31834" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364" }, { "name": "ADV-2008-2393", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2393" }, { "name": "FEDORA-2008-7293", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html" }, { "name": "MDVSA-2008:175", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2008-3533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugzilla.gnome.org/attachment.cgi?id=115890", "refsource": "CONFIRM", "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890" }, { "name": "31465", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31465" }, { "name": "30690", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30690" }, { "name": "SUSE-SR:2008:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31620" }, { "name": "USN-638-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-638-1" }, { "name": "32629", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32629" }, { "name": "yelp-uri-format-string(44449)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860" }, { "name": "31834", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31834" }, { "name": "http://bugzilla.gnome.org/show_bug.cgi?id=546364", "refsource": "CONFIRM", "url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364" }, { "name": "ADV-2008-2393", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2393" }, { "name": "FEDORA-2008-7293", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html" }, { "name": "MDVSA-2008:175", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2008-3533", "datePublished": "2008-08-18T17:15:00", "dateReserved": "2008-08-07T00:00:00", "dateUpdated": "2024-08-07T09:45:18.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1276
Vulnerability from cvelistv5
Published
2009-04-09 15:00
Modified
2024-08-07 05:04
Severity ?
EPSS score ?
Summary
XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications.
References
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/0978 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1022009 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/34421 | vdb-entry, x_refsource_BID | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:04:49.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1" }, { "name": "ADV-2009-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0978" }, { "name": "1022009", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022009" }, { "name": "34421", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34421" }, { "name": "255308", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-18T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1" }, { "name": "ADV-2009-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0978" }, { "name": "1022009", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022009" }, { "name": "34421", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34421" }, { "name": "255308", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1" }, { "name": "ADV-2009-0978", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0978" }, { "name": "1022009", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022009" }, { "name": "34421", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34421" }, { "name": "255308", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1276", "datePublished": "2009-04-09T15:00:00", "dateReserved": "2009-04-09T00:00:00", "dateUpdated": "2024-08-07T05:04:49.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7217
Vulnerability from cvelistv5
Published
2015-12-16 11:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201512-10 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html | vendor-advisory, x_refsource_FEDORA | |
http://www.ubuntu.com/usn/USN-2833-1 | vendor-advisory, x_refsource_UBUNTU | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1203078 | x_refsource_CONFIRM | |
http://www.mozilla.org/security/announce/2015/mfsa2015-143.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/79278 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id/1034426 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:45.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201512-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034426" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T20:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201512-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034426" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2015-7217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201512-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "openSUSE-SU-2015:2353", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "name": "openSUSE-SU-2016:0308", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "name": "FEDORA-2015-7ab3d3afcf", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "name": "USN-2833-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "name": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "name": "79278", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79278" }, { "name": "openSUSE-SU-2016:0307", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "name": "FEDORA-2015-51b1105902", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "name": "1034426", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034426" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2015-7217", "datePublished": "2015-12-16T11:00:00", "dateReserved": "2015-09-16T00:00:00", "dateUpdated": "2024-08-06T07:43:45.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2009-04-09 15:08
Modified
2024-11-21 01:02
Severity ?
Summary
XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gnome:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "49E5B508-4053-4FA4-9454-BC7E2D31DE05", "vulnerable": false }, { "criteria": "cpe:2.3:a:gnome:gnome:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AE904C0-4BF9-44EA-B17D-C8E5E43B103D", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:*:*:sparc:*:*:*:*:*", "matchCriteriaId": "D4A9DF86-60C3-41C2-8CB7-AD9841676694", "versionEndIncluding": "snv_108", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*", "matchCriteriaId": "7317C4A1-1365-40DD-A86F-808B64863750", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*", "matchCriteriaId": "79D94087-1308-408F-8C73-600B73AD958F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*", "matchCriteriaId": "DA468ACC-9AE2-4EF6-9B09-CF63092021D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*", "matchCriteriaId": "16719C48-5A35-4FEC-BE5F-3EA10A0357CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*", "matchCriteriaId": "5F87D3D5-0D3F-44BB-B15B-BB6D903A56E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*", "matchCriteriaId": "438EA608-2748-49E9-9B2A-663C774E627F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*", "matchCriteriaId": "B7E3945D-1580-4C68-93E0-E4CF96620C6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*", "matchCriteriaId": "51469BA0-7B46-4E79-9E35-A388AD834B29", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*", "matchCriteriaId": "49F52449-96AB-45BA-95F6-581F720D1819", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FC6243A-A896-4E52-B241-BDEA7486DAC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*", "matchCriteriaId": "E88850F1-A647-44B3-806A-71FC157D4964", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*", "matchCriteriaId": "9D15E371-4317-4882-BA09-F8CABB632C2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*", "matchCriteriaId": "311FC329-D973-4F51-B110-7FF1ED40DFA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*", "matchCriteriaId": "0288EC6B-C561-475C-9A3D-1ACF395B7326", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*", "matchCriteriaId": "D5CBEFF0-7B69-4831-AAC7-C02455D42900", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*", "matchCriteriaId": "6D4F7E6E-330F-4E02-A2FE-F7288ADFFA0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*", "matchCriteriaId": "B5D6CD58-C4AF-42AC-9377-EC1F1308FF29", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*", "matchCriteriaId": "AF924217-C227-4B90-9781-00561CE9C54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*", "matchCriteriaId": "114D9D19-23BC-41AF-9B30-40AB2852E74F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*", "matchCriteriaId": "F620054A-4D53-443B-8897-B2A5AB928CA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*", "matchCriteriaId": "FD1FDEB4-E659-41D0-B81E-FC1A1391288E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*", "matchCriteriaId": "218570AD-18C7-440E-A5BD-F16708ED4B08", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*", "matchCriteriaId": "2336F214-18CC-42A5-9DD0-1F1C09959CC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*", "matchCriteriaId": "207D2103-58A9-4BF9-81EF-74B264DB1B4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*", "matchCriteriaId": "8A4F9110-059D-4F6E-9414-762BD6142CDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*", "matchCriteriaId": "F1B245F6-DE46-4D52-98EE-32601FBCD254", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*", "matchCriteriaId": "28F4B989-7F55-467F-AD1A-AB965D31F504", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*", "matchCriteriaId": "9B6404BC-090E-419B-B10C-D275D5C0BFE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*", "matchCriteriaId": "4CF81FF0-D544-4C56-AD2E-51098DF2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*", "matchCriteriaId": "65F861F1-E66D-479D-838D-19D94DF03736", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*", "matchCriteriaId": "71FDF1A5-BD49-4E00-979E-3F953265E681", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*", "matchCriteriaId": "815771B3-541B-41D5-925F-29CB74900668", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*", "matchCriteriaId": "1EEAE62A-8BFA-4EB4-B4E9-DF83F4A33CCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*", "matchCriteriaId": "72827B1E-3F3D-40A0-AEEB-0CFFB12BF6D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*", "matchCriteriaId": "6F61F300-FEB0-42A7-87AE-E99AF2C26827", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*", "matchCriteriaId": "E64D67D0-E57D-46A9-BA7E-BB7FA05C0907", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*", "matchCriteriaId": "9500D5B2-DA1D-4082-83E4-92715D7F2D24", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*", "matchCriteriaId": "DD44C2D3-A690-4A9B-B855-EC2FEE8F5169", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*", "matchCriteriaId": "C92D0B2A-BA10-4AEB-84B9-962DD1AA76EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*", "matchCriteriaId": "BF7D0B02-7E5C-4760-96B2-902C680B897C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*", "matchCriteriaId": "CF68EA11-632F-4710-8CC7-192AF1BD7BB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*", "matchCriteriaId": "F9EC26BC-09D3-4F19-864F-7A1C4EC4756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*", "matchCriteriaId": "5994A4EE-3808-4863-B771-36864E202679", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*", "matchCriteriaId": "E977D01C-9C4B-411F-844E-7464147A12D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*", "matchCriteriaId": "A37177FE-FB56-4BCB-88BA-B91963DA19EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*", "matchCriteriaId": "BE640F29-CD64-44DD-9561-E205C5C241C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*", "matchCriteriaId": "078D7F9B-E2A8-4DC2-AD2E-FB0865091ECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*", "matchCriteriaId": "0FE35481-4580-4208-A6FA-7A0429D73793", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*", "matchCriteriaId": "84652D52-B89B-4127-9670-5FCDBBDE8053", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*", "matchCriteriaId": "CE51773E-C93C-4549-907A-5AF380F24B7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*", "matchCriteriaId": "D98D67BD-6C94-4E77-B6AC-3199C281A1BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*", "matchCriteriaId": "914CF995-B18B-43D2-AA9D-B486E768AFD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*", "matchCriteriaId": "922EE565-E3C2-44BA-9970-224FF874AE4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", "matchCriteriaId": "F8E26C9E-F87E-4484-89B9-42471F8410B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", "matchCriteriaId": "79E3D7EB-5B19-4D35-BE23-AB477E08FFEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", "matchCriteriaId": "B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", "matchCriteriaId": "15B2F895-CBFB-4E19-AF7E-7011EB0A372E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", "matchCriteriaId": "311F14F7-EE01-4525-8C58-8BF650246026", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", "matchCriteriaId": "BC339789-4DC4-4A82-A1BE-CE59AC0D657F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", "matchCriteriaId": "CF7C1C94-48A4-4F46-A337-92EB7B8C6837", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", "matchCriteriaId": "14C63D62-F6D4-4616-AF05-5E3387D63BC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", "matchCriteriaId": "6624E8DE-696A-402C-9088-CFE8ECC086BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", "matchCriteriaId": "04B5A32E-3D42-4500-A2BE-7ADFF3903386", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", "matchCriteriaId": "244EBFE7-05DD-4BBB-9793-310D71AC1721", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", "matchCriteriaId": "325EF996-AB8D-48CE-9A59-D338C823D927", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", "matchCriteriaId": "0EC8063A-1266-4443-B404-BB9C4D265B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", "matchCriteriaId": "424C989F-99C8-4337-AF15-4A51329938DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", "matchCriteriaId": "DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", "matchCriteriaId": "43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", "matchCriteriaId": "059880C5-B7FF-492D-97CA-FBC174FF8BF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", "matchCriteriaId": "5AC08000-2E71-465A-85F0-1AB8D1A51762", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", "matchCriteriaId": "D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", "matchCriteriaId": "C5D58609-62CB-446F-995E-FD334B89F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", "matchCriteriaId": "D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", "matchCriteriaId": "1B0F8F99-99B0-4A01-884B-442CEF8D061A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", "matchCriteriaId": "0CCE3456-0BA0-4303-B7CE-22B63EE86F03", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", "matchCriteriaId": "A4027F7E-F867-4DC7-BA53-08D7B36E13F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", "matchCriteriaId": "906228D3-2561-45C0-A79D-BAAC9F1AD7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", "matchCriteriaId": "7BE4DE93-D189-4528-89DA-17E9325457E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", "matchCriteriaId": "C4D46760-1924-4713-963E-E4A9AD085394", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", "matchCriteriaId": "B579204A-62EB-4D86-A22B-0726B9CB88DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*", "matchCriteriaId": "636FD13F-0A30-4B03-8AEC-ED225FC71251", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*", "matchCriteriaId": "B0593352-A568-4DDA-B1B8-77FA6DC93B54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*", "matchCriteriaId": "5299CAB1-9819-4AE4-9429-8CA32F692C86", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*", "matchCriteriaId": "ECD23A89-A86B-44D3-A3D1-EFF3D8551DCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*", "matchCriteriaId": "75B778E3-EFCF-4AB0-B2C7-E585C190CD3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*", "matchCriteriaId": "80CFB4CD-CE38-4F24-87EE-0CA622E4E9A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*", "matchCriteriaId": "460EE9E9-27BA-4C8B-9F06-BBA648105720", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*", "matchCriteriaId": "57CA01EF-2AFC-44FB-96EE-AF85B3019BEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*", "matchCriteriaId": "CD673F9F-442E-4997-A0E3-D4B595D16B3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*", "matchCriteriaId": "0BEADEEA-4D63-4E69-BFEE-02205150F909", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*", "matchCriteriaId": "54DA5312-D935-444E-8154-514C5BD6E3F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*", "matchCriteriaId": "EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*", "matchCriteriaId": "FF6EFE12-51AD-4879-9529-B7EA425059C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*", "matchCriteriaId": "7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*", "matchCriteriaId": "7A54DEC9-4F04-4E0A-B253-8822F114DCC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*", "matchCriteriaId": "447E9E9E-5B19-4261-8B70-F63EAE61DB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*", "matchCriteriaId": "2B4A015E-802F-4440-AF10-683B5E0586B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*", "matchCriteriaId": "04D12F3A-4C47-4B49-B3DE-484C1EE466E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*", "matchCriteriaId": "5BE8232A-2464-449A-A7B6-D44447AA9080", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*", "matchCriteriaId": "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*", "matchCriteriaId": "6061C499-21A8-4EC4-B5AD-F6E876B15C48", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*", "matchCriteriaId": "677C89EB-1575-46B6-A07C-C8BAA829F620", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*", "matchCriteriaId": "59679597-3883-4D20-A6E6-0C1CB0BAB3E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*", "matchCriteriaId": "98368E28-F8A9-40E3-ADB4-BF9F9F20F76D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*", "matchCriteriaId": "A799B071-D0A6-47C4-80DF-75AB9ADD2916", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*", "matchCriteriaId": "58A9EC84-8FD4-455F-95DE-FBFD67A1441E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*", "matchCriteriaId": "6DBDFD8C-371E-42D2-9635-D8CDD1775984", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*", "matchCriteriaId": "14CFA6D3-A611-4DF0-97AB-C30B79833DFA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gnome:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "49E5B508-4053-4FA4-9454-BC7E2D31DE05", "vulnerable": false }, { "criteria": "cpe:2.3:a:gnome:gnome:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AE904C0-4BF9-44EA-B17D-C8E5E43B103D", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:*:*:x86:*:*:*:*:*", "matchCriteriaId": "342DE19C-9923-45C8-A441-5101F117A1CD", "versionEndIncluding": "snv_108", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*", "matchCriteriaId": "7188371F-AE6E-437D-8F75-DE7049A51000", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*", "matchCriteriaId": "015968E1-B81E-4242-B4DF-94716179053B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*", "matchCriteriaId": "92262770-06B3-4B68-8DBE-AB6C61135F7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*", "matchCriteriaId": "C4DC58C1-792B-433D-A27B-5731C8414EBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*", "matchCriteriaId": "4AC63928-38F2-4677-8CBC-2F7DE0EF078F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*", "matchCriteriaId": "41B216C6-4BE9-4D47-A86E-4AD50ECB8F07", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*", "matchCriteriaId": "32AE7035-EA81-4A9B-A4C3-B85844E24FA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*", "matchCriteriaId": "948CAA3F-C5B0-434E-A4B1-16600729A17E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*", "matchCriteriaId": "168AD0C1-B437-4B5D-8AC4-BA4C6C60829B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*", "matchCriteriaId": "CDAD01B1-25E3-4ABD-BA48-03491D9C0D84", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*", "matchCriteriaId": "B38088AD-968D-44B9-ABCE-4E4D8675A88A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*", "matchCriteriaId": "7C385492-0B33-4757-9907-E69C7F709527", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*", "matchCriteriaId": "01C7A393-6744-4913-A9CC-75F311D2C59F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*", "matchCriteriaId": "F4961C98-1C39-4E6E-A0DB-C48E40F4FF54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*", "matchCriteriaId": "4DCF6792-8671-4CC0-99D5-7224E2B751A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*", "matchCriteriaId": "FFB7E165-13D6-41D5-B1C3-F96669E54796", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*", "matchCriteriaId": "D6011B94-9326-47A7-8292-BA0210401DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*", "matchCriteriaId": "9C2C4B0B-9B7A-4861-8CA8-64FC84DF31BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*", "matchCriteriaId": "F36C1E99-8CCD-48B7-94A7-8753AD7D6FBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*", "matchCriteriaId": "2F57B586-3593-41F9-9D01-0E18F58EB81A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*", "matchCriteriaId": "2E3B6A48-CA60-4ED9-BFF9-0FCDFABA865A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*", "matchCriteriaId": "09162A43-7EF2-464D-AD60-7046456932B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*", "matchCriteriaId": "3A4ECA0D-AB73-4790-945B-98CF6E27B94F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*", "matchCriteriaId": "530E1CDB-3B46-4762-875F-0B1075790204", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*", "matchCriteriaId": "55888CA5-938A-42D4-9898-93ED1AD88650", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*", "matchCriteriaId": "5D99E1F3-0341-43A9-9692-2AC812811EA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*", "matchCriteriaId": "27CA0C51-8331-459A-8256-9E363BE313BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*", "matchCriteriaId": "3FD00DE9-D8A8-4A03-B4B8-3F4368ADDDE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*", "matchCriteriaId": "4EFFA4CB-0984-4686-94BD-CE4D8AD70C42", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*", "matchCriteriaId": "BF0C5932-3B2B-44C8-8C0C-31A0CB66FF7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*", "matchCriteriaId": "B40B4B4C-34F3-4591-8989-D7D138D54C88", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*", "matchCriteriaId": "14FD3B27-6379-4F5C-9172-2A0494667727", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*", "matchCriteriaId": "114D8B9E-BDE9-49E6-9CD3-18B087522577", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*", "matchCriteriaId": "8275DABB-E792-4134-8418-496109936C1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*", "matchCriteriaId": "56768A4B-ABC8-4CF8-ABF1-059C8D4373CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*", "matchCriteriaId": "E249DDE1-EC3B-4A5C-A900-498526173570", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*", "matchCriteriaId": "2BE4A7FC-6112-4879-B083-19CC70DC6B91", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*", "matchCriteriaId": "DE882906-FF9D-492A-BDB7-237575D5E278", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*", "matchCriteriaId": "977AA6F7-F821-4229-B413-276231366899", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*", "matchCriteriaId": "F7B6E01F-E4EA-497E-BFB3-975F0123B4E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*", "matchCriteriaId": "9E644312-D55A-427F-BE4C-9AD280CC73F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*", "matchCriteriaId": "E7B7C4DE-DD83-4F61-B214-F0F9BD76E188", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*", "matchCriteriaId": "EF568362-9967-4ACB-A880-163A2E14D99A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*", "matchCriteriaId": "13B5EE88-E97B-47A1-8999-21C8C4D0C0E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*", "matchCriteriaId": "BD456A40-4017-4509-A4B0-44FBB3443645", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*", "matchCriteriaId": "F9456E55-1587-4BBF-A073-601D34E0CDB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*", "matchCriteriaId": "CD289DC7-2779-47B6-B44C-6B3C6EC5F93D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*", "matchCriteriaId": "8163CA38-BF92-4F02-85EA-E6EFD5A500F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*", "matchCriteriaId": "6043F9A0-5FA1-4101-8452-E7A8652FE79C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*", "matchCriteriaId": "3CDC9FF7-5FC1-4473-920F-37105009BF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*", "matchCriteriaId": "6789ECB3-925F-4E16-9213-12FE3EB191CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*", "matchCriteriaId": "9D309DD1-37A6-49BC-B8DB-6260D47DDD71", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*", "matchCriteriaId": "28CBB9C9-54DB-4259-9D9F-C617E23C4221", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*", "matchCriteriaId": "FC09D568-2B1E-46A2-9029-B3850E5A1167", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*", "matchCriteriaId": "96E164AF-3346-4FF3-875A-5EA239F50BDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*", "matchCriteriaId": "D3B05762-2B56-41A1-B424-54A5CFFEC47A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*", "matchCriteriaId": "A6442F9F-E16E-4146-BA6D-92BBCB71EC63", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*", "matchCriteriaId": "4D10B1B2-698B-4F02-9392-682AF78EC633", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*", "matchCriteriaId": "B69EECEC-86DB-4F35-9204-B0931ABC28DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*", "matchCriteriaId": "8130EE2C-DC76-4BE3-B2DC-6FC540CD5277", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*", "matchCriteriaId": "CFC0C58B-980F-4C65-97BF-67C9E731BA11", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*", "matchCriteriaId": "B0F7D5DE-0491-47F6-834A-0FA208213010", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*", "matchCriteriaId": "8071BF6A-789C-4DB7-8247-B86EA34DB9B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*", "matchCriteriaId": "EECE627D-3AE8-4207-87A8-F95746F693F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*", "matchCriteriaId": "E6950900-2293-4DA0-89E8-DAFABBF423DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*", "matchCriteriaId": "AB4764E7-E772-45BC-896B-C7BE287A8EAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*", "matchCriteriaId": "4122F0EE-3A2F-456F-B8CF-82565F8DCD4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*", "matchCriteriaId": "5686A925-4978-4883-8DC1-978B09DC9489", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*", "matchCriteriaId": "13B81B14-84C8-468A-AE11-30C4CB85E6F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*", "matchCriteriaId": "6395A3A9-97F2-4C88-B6D6-70DB2ACDC70D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*", "matchCriteriaId": "8CC54F69-E96A-482F-B43D-2E3A7EC90E47", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*", "matchCriteriaId": "CDC656B7-529A-4963-955D-301A11CF5D09", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*", "matchCriteriaId": "506769C9-D306-4EEC-BE2E-6E501CBE90BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*", "matchCriteriaId": "37540C8F-FCC1-42DA-8EE3-D3E4FA5B315C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*", "matchCriteriaId": "7AD5054B-18D8-44AE-AA4F-A07D12A63E55", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*", "matchCriteriaId": "4BAD68C2-4AA2-4346-B279-51206E0651FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*", "matchCriteriaId": "96F3D4B3-7828-40EB-BD67-A3CD5B210787", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*", "matchCriteriaId": "C166F9F7-E8AB-4BA1-AEB6-1E7964976801", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*", "matchCriteriaId": "12B6730F-6CF1-4990-953F-1CC76D78B618", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*", "matchCriteriaId": "03B96DE7-70BD-4CD8-9574-8C024E51E91C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*", "matchCriteriaId": "52D5BB76-FF5E-4BBA-A2D0-00EB574B9104", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*", "matchCriteriaId": "C29B1192-D709-48FB-816C-B4F30460E957", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*", "matchCriteriaId": "6DB1AC08-2564-4AAB-82AE-EB504FAA34FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*", "matchCriteriaId": "46D8D5D1-8855-4116-99B3-EA1F78FDEF02", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*", "matchCriteriaId": "999FFE1D-D7D4-476B-8A46-9D0179DB570B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*", "matchCriteriaId": "2B14945C-350A-4895-92C1-932208533F9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*", "matchCriteriaId": "513D435B-D28B-4833-88E6-A1A8743177F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*", "matchCriteriaId": "4126C6C9-90AB-470E-AF83-4ED1FDD90511", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*", "matchCriteriaId": "3275E47F-5A4B-4843-A07C-82DEE852672C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*", "matchCriteriaId": "58017DDC-63B3-458C-9803-4683211A4C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*", "matchCriteriaId": "6692EE63-A76B-47C3-BC0D-7C15CA6FE013", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*", "matchCriteriaId": "BA1E27E5-FE20-42FA-9A61-A7174E705EB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*", "matchCriteriaId": "65A32803-580D-4D07-B39B-2159258CBA8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*", "matchCriteriaId": "13B51612-3BD6-449F-AD63-D01F8D05B269", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*", "matchCriteriaId": "4B2E7E54-2268-4C54-9363-C2D363D3A447", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*", "matchCriteriaId": "F6000B0F-0E72-4E68-A5EE-35BA6FB59C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*", "matchCriteriaId": "51AB0746-66E6-4FF5-9CB2-42E29A01C961", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*", "matchCriteriaId": "D1A9DCF7-F469-4D77-966F-3721F377D80B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*", "matchCriteriaId": "3D028821-CA38-48C4-9324-222526AC8413", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*", "matchCriteriaId": "1F2CB558-9390-4AAE-A66D-E3DA537E3115", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*", "matchCriteriaId": "5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*", "matchCriteriaId": "411B33D1-F55D-42C0-9046-040ABC42E31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*", "matchCriteriaId": "0491828F-8BB7-4463-AEE7-BFA0C574B6A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*", "matchCriteriaId": "CE4D5683-259F-449E-B1C7-2BD81CC4805F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*", "matchCriteriaId": "42B7F288-2D35-4988-97B0-C529485033C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*", "matchCriteriaId": "F276AFE2-B501-4355-9716-9D1A75AD09CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*", "matchCriteriaId": "8ADE7EBB-8014-459F-A189-9D902BEE1FD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*", "matchCriteriaId": "E2F84D4E-EFE1-4A4F-BB58-E665A9C307A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*", "matchCriteriaId": "F2F5901D-AB91-4F12-BF08-0BC3797833E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications." }, { "lang": "es", "value": "XScreenSaver en Sun Solaris v10 and OpenSolaris anteriores a snv_109, y Solaris v8 y v9 con GNOME v2.0 o v2.0.2, permite a atacantes pr\u00f3ximos f\u00edsicamente conseguir informaci\u00f3n sensible, leyendo las ventanas \"PopUp\"s, que se muestran cuando la pantalla se bloquea, como se demostr\u00f3 en las notificaciones de nuevo mensaje de Thunderbird." } ], "id": "CVE-2009-1276", "lastModified": "2024-11-21T01:02:04.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-09T15:08:35.843", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022009" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34421" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0978" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-18 17:41
Modified
2024-11-21 00:49
Severity ?
Summary
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:yelp:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB1D4D2-4900-45B5-BAB7-84A6EBFC0C49", "versionEndExcluding": "2.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gnome:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "B99DE8F3-3B18-4A57-9E28-849A81884256", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:gnome:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "BCF0421C-DC15-4ED7-8F21-B92974D09E82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs." }, { "lang": "es", "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n window_error de yelp-window.c en yelp de Gnome despu\u00e9s de 2.19.90 y antes de 2.24 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de formato de cadena en un URI no v\u00e1lido en l\u00ednea de comandos, como se demostr\u00f3 utilizando yelp en los controladores URI (1) man o (2) ghelp en Firefox, Evolution y otros programas no especificados." } ], "id": "CVE-2008-3533", "lastModified": "2024-11-21T00:49:28.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-18T17:41:00.000", "references": [ { "source": "security@ubuntu.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890" }, { "source": "security@ubuntu.com", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31465" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31620" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31834" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32629" }, { "source": "security@ubuntu.com", "tags": [ "Product" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/30690" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-638-1" }, { "source": "security@ubuntu.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/2393" }, { "source": "security@ubuntu.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860" }, { "source": "security@ubuntu.com", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://bugzilla.gnome.org/attachment.cgi?id=115890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/30690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-638-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/2393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html" } ], "sourceIdentifier": "security@ubuntu.com", "vendorComments": [ { "comment": "This issue does not affect the versions of the yelp package, as shipped with Red Hat Enterprise Linux 3, 4 and 5.", "lastModified": "2008-08-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-16 11:59
Modified
2024-11-21 02:36
Severity ?
Summary
The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "matchCriteriaId": "735317AD-14B8-4A73-B5B0-6A4C84FC202E", "versionEndIncluding": "42.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "matchCriteriaId": "E47D9E40-1702-4CCB-BC60-C0E6012B36FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image." }, { "lang": "es", "value": "La configuraci\u00f3n gdk-pixbuf en Mozilla Firefox en versiones anteriores a 43.0 en plataformas Linux GNOME habilita incorrectamente el decodificador JasPer, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de una imagen JPEG 2000 manipulada." } ], "id": "CVE-2015-7216", "lastModified": "2024-11-21T02:36:21.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-12-16T11:59:14.477", "references": [ { "source": "security@mozilla.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "source": "security@mozilla.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "source": "security@mozilla.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "source": "security@mozilla.org", "url": "http://www.securityfocus.com/bid/79278" }, { "source": "security@mozilla.org", "url": "http://www.securitytracker.com/id/1034426" }, { "source": "security@mozilla.org", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "source": "security@mozilla.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "source": "security@mozilla.org", "url": "https://security.gentoo.org/glsa/201512-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/79278" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1197059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201512-10" } ], "sourceIdentifier": "security@mozilla.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-16 11:59
Modified
2024-11-21 02:36
Severity ?
Summary
The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "matchCriteriaId": "735317AD-14B8-4A73-B5B0-6A4C84FC202E", "versionEndIncluding": "42.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*", "matchCriteriaId": "E47D9E40-1702-4CCB-BC60-C0E6012B36FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image." }, { "lang": "es", "value": "La configuraci\u00f3n gdk-pixbuf en Mozilla Firefox en versiones anteriores a 43.0 en plataformas Linux GNOME habilita incorrectamente el decodificador TGA, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (desbordamiento de buffer basado en memoria din\u00e1mica) a trav\u00e9s de una imagen Truevision TGA manipulada." } ], "id": "CVE-2015-7217", "lastModified": "2024-11-21T02:36:21.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-12-16T11:59:15.417", "references": [ { "source": "security@mozilla.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "source": "security@mozilla.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "source": "security@mozilla.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "source": "security@mozilla.org", "url": "http://www.securityfocus.com/bid/79278" }, { "source": "security@mozilla.org", "url": "http://www.securitytracker.com/id/1034426" }, { "source": "security@mozilla.org", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "source": "security@mozilla.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "source": "security@mozilla.org", "url": "https://security.gentoo.org/glsa/201512-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-143.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/79278" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2833-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1203078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201512-10" } ], "sourceIdentifier": "security@mozilla.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }