Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0179 (GCVE-0-2009-0179)
Vulnerability from cvelistv5 – Published: 2009-01-20 16:00 – Updated: 2024-08-07 04:24- n/a
| URL | Tags |
|---|---|
| http://secunia.com/advisories/34259 | third-party-advisoryx_refsource_SECUNIA |
| https://www.redhat.com/archives/fedora-package-an… | vendor-advisoryx_refsource_FEDORA |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://www.securityfocus.com/bid/33240 | vdb-entryx_refsource_BID |
| http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339 | x_refsource_MISC |
| https://www.redhat.com/archives/fedora-package-an… | vendor-advisoryx_refsource_FEDORA |
| https://bugzilla.redhat.com/show_bug.cgi?id=479833 | x_refsource_CONFIRM |
| http://openwall.com/lists/oss-security/2009/01/13/2 | mailing-listx_refsource_MLIST |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:24:18.168Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "34259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34259"
},
{
"name": "FEDORA-2009-9095",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "SUSE-SR:2009:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "33240",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/33240"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"name": "FEDORA-2009-9112",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-01-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-01-29T10:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "34259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34259"
},
{
"name": "FEDORA-2009-9095",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "SUSE-SR:2009:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "33240",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/33240"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"name": "FEDORA-2009-9112",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "34259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34259"
},
{
"name": "FEDORA-2009-9095",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "SUSE-SR:2009:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "33240",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33240"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"name": "FEDORA-2009-9112",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=479833",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0179",
"datePublished": "2009-01-20T16:00:00.000Z",
"dateReserved": "2009-01-20T00:00:00.000Z",
"dateUpdated": "2024-08-07T04:24:18.168Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-0179",
"date": "2026-05-20",
"epss": "0.0219",
"percentile": "0.84577"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"436CE81E-616B-40E4-825A-961EC9672896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1C4E395-10DE-42A4-830C-803CE1F79F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4593CEA9-5661-4F3C-B38B-369FD2043D7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D05D8EDA-FE5E-483A-AC78-DAFE129705C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CA7EDD1-5C30-41E8-B93A-F2C5FA754F64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0F92EE1-D5F8-47A3-B674-A593A7829DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F1448EB-FDFC-434A-ACE9-F6CC52B523E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6B9F0C8-15C0-47BF-AE69-2216A65D1D48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0524F58-BC45-4A81-BB99-F09F03047665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA48214A-CF42-4378-A422-803EDE5632CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F08B9B6-0CCD-4388-B33A-98F6A65FAEF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0D92BE-E4F7-42CF-AA61-71CD46319E2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"563D3D39-DAFB-4F0C-BCBB-917C5082137F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA98B82C-B0BD-4546-8047-63ECDCA27B4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE994EED-EA67-4A52-9AAD-30259DCD8C1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB091C37-6020-4202-AC51-B597C2890E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F88BF46A-B01D-4D8E-8BFF-6E864EBA5FE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31AA2232-8FB5-4BA3-BBB1-B54443C2D57C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:igno_saitz:libmikmod:3.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B88DA6E-D815-4904-AE07-5C54E72057AA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.\"}, {\"lang\": \"es\", \"value\": \"libmikmod v3.1.11 hasta v3.2.0, como el utilizado por MikMod y posiblemente otros productos, permite a atacantes ayudados por el usuario provocar una denegaci\\u00f3n de servicio (caida de aplicaci\\u00f3n) cargando un fichero XM.\"}]",
"id": "CVE-2009-0179",
"lastModified": "2024-11-21T00:59:17.530",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2009-01-20T16:30:00.453",
"references": "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openwall.com/lists/oss-security/2009/01/13/2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34259\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/33240\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=479833\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openwall.com/lists/oss-security/2009/01/13/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/33240\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=479833\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0179\\n\\nThe Red Hat Security Response Team has rated this issue as having low security\\nimpact, a future update may address this flaw. More information regarding\\nissue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\", \"lastModified\": \"2009-01-21T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0179\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-01-20T16:30:00.453\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.\"},{\"lang\":\"es\",\"value\":\"libmikmod v3.1.11 hasta v3.2.0, como el utilizado por MikMod y posiblemente otros productos, permite a atacantes ayudados por el usuario provocar una denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) cargando un fichero XM.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436CE81E-616B-40E4-825A-961EC9672896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C4E395-10DE-42A4-830C-803CE1F79F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4593CEA9-5661-4F3C-B38B-369FD2043D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05D8EDA-FE5E-483A-AC78-DAFE129705C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA7EDD1-5C30-41E8-B93A-F2C5FA754F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F92EE1-D5F8-47A3-B674-A593A7829DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F1448EB-FDFC-434A-ACE9-F6CC52B523E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B9F0C8-15C0-47BF-AE69-2216A65D1D48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0524F58-BC45-4A81-BB99-F09F03047665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA48214A-CF42-4378-A422-803EDE5632CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F08B9B6-0CCD-4388-B33A-98F6A65FAEF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0D92BE-E4F7-42CF-AA61-71CD46319E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563D3D39-DAFB-4F0C-BCBB-917C5082137F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA98B82C-B0BD-4546-8047-63ECDCA27B4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE994EED-EA67-4A52-9AAD-30259DCD8C1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB091C37-6020-4202-AC51-B597C2890E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88BF46A-B01D-4D8E-8BFF-6E864EBA5FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AA2232-8FB5-4BA3-BBB1-B54443C2D57C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:igno_saitz:libmikmod:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B88DA6E-D815-4904-AE07-5C54E72057AA\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2009/01/13/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34259\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/33240\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=479833\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2009/01/13/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/33240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=479833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0179\\n\\nThe Red Hat Security Response Team has rated this issue as having low security\\nimpact, a future update may address this flaw. More information regarding\\nissue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\",\"lastModified\":\"2009-01-21T00:00:00\"}]}}"
}
}
CERTFR-2014-AVI-112
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5718",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5718"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2013-4123",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4123"
},
{
"name": "CVE-2013-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5745"
},
{
"name": "CVE-2013-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4231"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4164",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4164"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2014-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0397"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2013-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1418"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2012-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6150"
},
{
"name": "CVE-2013-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5717"
},
{
"name": "CVE-2013-6340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6340"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2013-6337",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6337"
},
{
"name": "CVE-2013-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0900"
},
{
"name": "CVE-2013-6339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6339"
},
{
"name": "CVE-2013-4363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4363"
},
{
"name": "CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2008-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0386"
},
{
"name": "CVE-2012-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4504"
},
{
"name": "CVE-2012-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2893"
},
{
"name": "CVE-2012-4505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4505"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2013-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4287"
},
{
"name": "CVE-2009-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0179"
},
{
"name": "CVE-2013-6338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6338"
},
{
"name": "CVE-2013-6336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6336"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4124",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4124"
},
{
"name": "CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"name": "CVE-2013-2561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2561"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2013-5719",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5719"
},
{
"name": "CVE-2013-7114",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7114"
},
{
"name": "CVE-2013-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1417"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2013-5722",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5722"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2013-5720",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5720"
},
{
"name": "CVE-2012-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2825"
},
{
"name": "CVE-2013-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4475"
}
],
"links": [],
"reference": "CERTFR-2014-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 25 f\u00e9vrier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTFR-2014-AVI-112
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5718",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5718"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2013-4123",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4123"
},
{
"name": "CVE-2013-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5745"
},
{
"name": "CVE-2013-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4231"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4164",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4164"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2014-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0397"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2013-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1418"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2012-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6150"
},
{
"name": "CVE-2013-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5717"
},
{
"name": "CVE-2013-6340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6340"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2013-6337",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6337"
},
{
"name": "CVE-2013-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0900"
},
{
"name": "CVE-2013-6339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6339"
},
{
"name": "CVE-2013-4363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4363"
},
{
"name": "CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2008-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0386"
},
{
"name": "CVE-2012-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4504"
},
{
"name": "CVE-2012-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2893"
},
{
"name": "CVE-2012-4505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4505"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2013-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4287"
},
{
"name": "CVE-2009-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0179"
},
{
"name": "CVE-2013-6338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6338"
},
{
"name": "CVE-2013-6336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6336"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4124",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4124"
},
{
"name": "CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"name": "CVE-2013-2561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2561"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2013-5719",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5719"
},
{
"name": "CVE-2013-7114",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7114"
},
{
"name": "CVE-2013-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1417"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2013-5722",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5722"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2013-5720",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5720"
},
{
"name": "CVE-2012-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2825"
},
{
"name": "CVE-2013-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4475"
}
],
"links": [],
"reference": "CERTFR-2014-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 25 f\u00e9vrier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
FKIE_CVE-2009-0179
Vulnerability from fkie_nvd - Published: 2009-01-20 16:30 - Updated: 2026-04-23 00:35| Vendor | Product | Version | |
|---|---|---|---|
| igno_saitz | libmikmod | 3.1.9-1 | |
| igno_saitz | libmikmod | 3.1.9-2 | |
| igno_saitz | libmikmod | 3.1.9-3 | |
| igno_saitz | libmikmod | 3.1.9-4 | |
| igno_saitz | libmikmod | 3.1.9-5 | |
| igno_saitz | libmikmod | 3.1.9-6 | |
| igno_saitz | libmikmod | 3.1.10-1 | |
| igno_saitz | libmikmod | 3.1.10-2 | |
| igno_saitz | libmikmod | 3.1.10-3 | |
| igno_saitz | libmikmod | 3.1.10-4 | |
| igno_saitz | libmikmod | 3.1.10-5 | |
| igno_saitz | libmikmod | 3.1.11-1 | |
| igno_saitz | libmikmod | 3.1.11-2 | |
| igno_saitz | libmikmod | 3.1.11-3 | |
| igno_saitz | libmikmod | 3.1.11-4 | |
| igno_saitz | libmikmod | 3.1.11-5 | |
| igno_saitz | libmikmod | 3.1.11-6 | |
| igno_saitz | libmikmod | 3.1.12 | |
| igno_saitz | libmikmod | 3.2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1:*:*:*:*:*:*:*",
"matchCriteriaId": "436CE81E-616B-40E4-825A-961EC9672896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C4E395-10DE-42A4-830C-803CE1F79F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3:*:*:*:*:*:*:*",
"matchCriteriaId": "4593CEA9-5661-4F3C-B38B-369FD2043D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4:*:*:*:*:*:*:*",
"matchCriteriaId": "D05D8EDA-FE5E-483A-AC78-DAFE129705C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA7EDD1-5C30-41E8-B93A-F2C5FA754F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F92EE1-D5F8-47A3-B674-A593A7829DD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1448EB-FDFC-434A-ACE9-F6CC52B523E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B9F0C8-15C0-47BF-AE69-2216A65D1D48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0524F58-BC45-4A81-BB99-F09F03047665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4:*:*:*:*:*:*:*",
"matchCriteriaId": "CA48214A-CF42-4378-A422-803EDE5632CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F08B9B6-0CCD-4388-B33A-98F6A65FAEF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0D92BE-E4F7-42CF-AA61-71CD46319E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2:*:*:*:*:*:*:*",
"matchCriteriaId": "563D3D39-DAFB-4F0C-BCBB-917C5082137F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA98B82C-B0BD-4546-8047-63ECDCA27B4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE994EED-EA67-4A52-9AAD-30259DCD8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5:*:*:*:*:*:*:*",
"matchCriteriaId": "EB091C37-6020-4202-AC51-B597C2890E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6:*:*:*:*:*:*:*",
"matchCriteriaId": "F88BF46A-B01D-4D8E-8BFF-6E864EBA5FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31AA2232-8FB5-4BA3-BBB1-B54443C2D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:igno_saitz:libmikmod:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B88DA6E-D815-4904-AE07-5C54E72057AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file."
},
{
"lang": "es",
"value": "libmikmod v3.1.11 hasta v3.2.0, como el utilizado por MikMod y posiblemente otros productos, permite a atacantes ayudados por el usuario provocar una denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) cargando un fichero XM."
}
],
"id": "CVE-2009-0179",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-01-20T16:30:00.453",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"source": "cve@mitre.org",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34259"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/33240"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/33240"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0179\n\nThe Red Hat Security Response Team has rated this issue as having low security\nimpact, a future update may address this flaw. More information regarding\nissue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/",
"lastModified": "2009-01-21T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R724-8435-XV6F
Vulnerability from github – Published: 2022-05-02 03:13 – Updated: 2022-05-02 03:13libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
{
"affected": [],
"aliases": [
"CVE-2009-0179"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-01-20T16:30:00Z",
"severity": "MODERATE"
},
"details": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.",
"id": "GHSA-r724-8435-xv6f",
"modified": "2022-05-02T03:13:25Z",
"published": "2022-05-02T03:13:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0179"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/34259"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/33240"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2009-0179
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-0179",
"description": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.",
"id": "GSD-2009-0179",
"references": [
"https://www.suse.com/security/cve/CVE-2009-0179.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0179"
],
"details": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.",
"id": "GSD-2009-0179",
"modified": "2023-12-13T01:19:43.949663Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "34259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34259"
},
{
"name": "FEDORA-2009-9095",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "SUSE-SR:2009:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "33240",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33240"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"name": "FEDORA-2009-9112",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=479833",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0179"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20090113 CVE Request -- libmikmod",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2009/01/13/2"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339",
"refsource": "MISC",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=479833",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=479833"
},
{
"name": "33240",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/33240"
},
{
"name": "SUSE-SR:2009:006",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "34259",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/34259"
},
{
"name": "FEDORA-2009-9095",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html"
},
{
"name": "FEDORA-2009-9112",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2009-09-02T05:20Z",
"publishedDate": "2009-01-20T16:30Z"
}
}
}
OPENSUSE-SU-2024:10305-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libmikmod-devel-3.3.7-1.7 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libmikmod-devel-3.3.7-1.7 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10305",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10305-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-6720 page",
"url": "https://www.suse.com/security/cve/CVE-2007-6720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0179 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3995 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3996 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2546 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2546/"
}
],
"title": "libmikmod-devel-3.3.7-1.7 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10305-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmikmod-devel-3.3.7-1.7.aarch64",
"product": {
"name": "libmikmod-devel-3.3.7-1.7.aarch64",
"product_id": "libmikmod-devel-3.3.7-1.7.aarch64"
}
},
{
"category": "product_version",
"name": "libmikmod3-3.3.7-1.7.aarch64",
"product": {
"name": "libmikmod3-3.3.7-1.7.aarch64",
"product_id": "libmikmod3-3.3.7-1.7.aarch64"
}
},
{
"category": "product_version",
"name": "libmikmod3-32bit-3.3.7-1.7.aarch64",
"product": {
"name": "libmikmod3-32bit-3.3.7-1.7.aarch64",
"product_id": "libmikmod3-32bit-3.3.7-1.7.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmikmod-devel-3.3.7-1.7.ppc64le",
"product": {
"name": "libmikmod-devel-3.3.7-1.7.ppc64le",
"product_id": "libmikmod-devel-3.3.7-1.7.ppc64le"
}
},
{
"category": "product_version",
"name": "libmikmod3-3.3.7-1.7.ppc64le",
"product": {
"name": "libmikmod3-3.3.7-1.7.ppc64le",
"product_id": "libmikmod3-3.3.7-1.7.ppc64le"
}
},
{
"category": "product_version",
"name": "libmikmod3-32bit-3.3.7-1.7.ppc64le",
"product": {
"name": "libmikmod3-32bit-3.3.7-1.7.ppc64le",
"product_id": "libmikmod3-32bit-3.3.7-1.7.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmikmod-devel-3.3.7-1.7.s390x",
"product": {
"name": "libmikmod-devel-3.3.7-1.7.s390x",
"product_id": "libmikmod-devel-3.3.7-1.7.s390x"
}
},
{
"category": "product_version",
"name": "libmikmod3-3.3.7-1.7.s390x",
"product": {
"name": "libmikmod3-3.3.7-1.7.s390x",
"product_id": "libmikmod3-3.3.7-1.7.s390x"
}
},
{
"category": "product_version",
"name": "libmikmod3-32bit-3.3.7-1.7.s390x",
"product": {
"name": "libmikmod3-32bit-3.3.7-1.7.s390x",
"product_id": "libmikmod3-32bit-3.3.7-1.7.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmikmod-devel-3.3.7-1.7.x86_64",
"product": {
"name": "libmikmod-devel-3.3.7-1.7.x86_64",
"product_id": "libmikmod-devel-3.3.7-1.7.x86_64"
}
},
{
"category": "product_version",
"name": "libmikmod3-3.3.7-1.7.x86_64",
"product": {
"name": "libmikmod3-3.3.7-1.7.x86_64",
"product_id": "libmikmod3-3.3.7-1.7.x86_64"
}
},
{
"category": "product_version",
"name": "libmikmod3-32bit-3.3.7-1.7.x86_64",
"product": {
"name": "libmikmod3-32bit-3.3.7-1.7.x86_64",
"product_id": "libmikmod3-32bit-3.3.7-1.7.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod-devel-3.3.7-1.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64"
},
"product_reference": "libmikmod-devel-3.3.7-1.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod-devel-3.3.7-1.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le"
},
"product_reference": "libmikmod-devel-3.3.7-1.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod-devel-3.3.7-1.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x"
},
"product_reference": "libmikmod-devel-3.3.7-1.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod-devel-3.3.7-1.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64"
},
"product_reference": "libmikmod-devel-3.3.7-1.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-3.3.7-1.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64"
},
"product_reference": "libmikmod3-3.3.7-1.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-3.3.7-1.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le"
},
"product_reference": "libmikmod3-3.3.7-1.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-3.3.7-1.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x"
},
"product_reference": "libmikmod3-3.3.7-1.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-3.3.7-1.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64"
},
"product_reference": "libmikmod3-3.3.7-1.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-32bit-3.3.7-1.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64"
},
"product_reference": "libmikmod3-32bit-3.3.7-1.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-32bit-3.3.7-1.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le"
},
"product_reference": "libmikmod3-32bit-3.3.7-1.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-32bit-3.3.7-1.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x"
},
"product_reference": "libmikmod3-32bit-3.3.7-1.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmikmod3-32bit-3.3.7-1.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
},
"product_reference": "libmikmod3-32bit-3.3.7-1.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-6720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-6720"
}
],
"notes": [
{
"category": "general",
"text": "libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-6720",
"url": "https://www.suse.com/security/cve/CVE-2007-6720"
},
{
"category": "external",
"summary": "SUSE Bug 468760 for CVE-2007-6720",
"url": "https://bugzilla.suse.com/468760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-6720"
},
{
"cve": "CVE-2009-0179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0179"
}
],
"notes": [
{
"category": "general",
"text": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0179",
"url": "https://www.suse.com/security/cve/CVE-2009-0179"
},
{
"category": "external",
"summary": "SUSE Bug 468760 for CVE-2009-0179",
"url": "https://bugzilla.suse.com/468760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-0179"
},
{
"cve": "CVE-2009-3995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3995"
}
],
"notes": [
{
"category": "general",
"text": "Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file. NOTE: some of these details are obtained from third party information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3995",
"url": "https://www.suse.com/security/cve/CVE-2009-3995"
},
{
"category": "external",
"summary": "SUSE Bug 577875 for CVE-2009-3995",
"url": "https://bugzilla.suse.com/577875"
},
{
"category": "external",
"summary": "SUSE Bug 625547 for CVE-2009-3995",
"url": "https://bugzilla.suse.com/625547"
},
{
"category": "external",
"summary": "SUSE Bug 752802 for CVE-2009-3995",
"url": "https://bugzilla.suse.com/752802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-3995"
},
{
"cve": "CVE-2009-3996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3996"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3996",
"url": "https://www.suse.com/security/cve/CVE-2009-3996"
},
{
"category": "external",
"summary": "SUSE Bug 577875 for CVE-2009-3996",
"url": "https://bugzilla.suse.com/577875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-3996"
},
{
"cve": "CVE-2010-2546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2546"
}
],
"notes": [
{
"category": "general",
"text": "Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, possibly 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2546",
"url": "https://www.suse.com/security/cve/CVE-2010-2546"
},
{
"category": "external",
"summary": "SUSE Bug 625547 for CVE-2010-2546",
"url": "https://bugzilla.suse.com/625547"
},
{
"category": "external",
"summary": "SUSE Bug 752802 for CVE-2010-2546",
"url": "https://bugzilla.suse.com/752802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod-devel-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-3.3.7-1.7.x86_64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.aarch64",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.ppc64le",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.s390x",
"openSUSE Tumbleweed:libmikmod3-32bit-3.3.7-1.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2010-2546"
}
]
}
OPENSUSE-SU-2024:11462-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "timidity-2.15.0-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the timidity-2.15.0-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11462",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11462-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0179 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2971 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11546 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11547 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11547/"
}
],
"title": "timidity-2.15.0-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11462-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "timidity-2.15.0-2.2.aarch64",
"product": {
"name": "timidity-2.15.0-2.2.aarch64",
"product_id": "timidity-2.15.0-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "timidity-2.15.0-2.2.ppc64le",
"product": {
"name": "timidity-2.15.0-2.2.ppc64le",
"product_id": "timidity-2.15.0-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "timidity-2.15.0-2.2.s390x",
"product": {
"name": "timidity-2.15.0-2.2.s390x",
"product_id": "timidity-2.15.0-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "timidity-2.15.0-2.2.x86_64",
"product": {
"name": "timidity-2.15.0-2.2.x86_64",
"product_id": "timidity-2.15.0-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "timidity-2.15.0-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64"
},
"product_reference": "timidity-2.15.0-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "timidity-2.15.0-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le"
},
"product_reference": "timidity-2.15.0-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "timidity-2.15.0-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x"
},
"product_reference": "timidity-2.15.0-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "timidity-2.15.0-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
},
"product_reference": "timidity-2.15.0-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0179"
}
],
"notes": [
{
"category": "general",
"text": "libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0179",
"url": "https://www.suse.com/security/cve/CVE-2009-0179"
},
{
"category": "external",
"summary": "SUSE Bug 468760 for CVE-2009-0179",
"url": "https://bugzilla.suse.com/468760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-0179"
},
{
"cve": "CVE-2010-2971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2971"
}
],
"notes": [
{
"category": "general",
"text": "loaders/load_it.c in libmikmod, possibly 3.1.12, does not properly account for the larger size of name##env relative to name##tick and name##node, which allows remote attackers to trigger a buffer over-read and possibly have unspecified other impact via a crafted Impulse Tracker file, a related issue to CVE-2010-2546. NOTE: this issue exists because of an incomplete fix for CVE-2009-3995.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2971",
"url": "https://www.suse.com/security/cve/CVE-2010-2971"
},
{
"category": "external",
"summary": "SUSE Bug 752802 for CVE-2010-2971",
"url": "https://bugzilla.suse.com/752802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2010-2971"
},
{
"cve": "CVE-2017-11546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11546"
}
],
"notes": [
{
"category": "general",
"text": "The insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mid file. NOTE: a crash might be relevant when using the --background option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11546",
"url": "https://www.suse.com/security/cve/CVE-2017-11546"
},
{
"category": "external",
"summary": "SUSE Bug 1081694 for CVE-2017-11546",
"url": "https://bugzilla.suse.com/1081694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-11546"
},
{
"cve": "CVE-2017-11547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11547"
}
],
"notes": [
{
"category": "general",
"text": "The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11547",
"url": "https://www.suse.com/security/cve/CVE-2017-11547"
},
{
"category": "external",
"summary": "SUSE Bug 1081694 for CVE-2017-11547",
"url": "https://bugzilla.suse.com/1081694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:timidity-2.15.0-2.2.aarch64",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.ppc64le",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.s390x",
"openSUSE Tumbleweed:timidity-2.15.0-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-11547"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.