Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3379 (GCVE-0-2009-3379)
Vulnerability from cvelistv5 – Published: 2009-10-29 14:00 – Updated: 2024-08-07 06:22- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:22:24.439Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"name": "37340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37340"
},
{
"name": "oval:org.mitre.oval:def:6582",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"name": "37306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37306"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"name": "272909",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"name": "RHSA-2009:1561",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"name": "FEDORA-2009-11169",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"name": "oval:org.mitre.oval:def:10993",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"name": "FEDORA-2009-11243",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"name": "USN-861-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"name": "ADV-2009-3334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"name": "MDVSA-2009:294",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"name": "37340",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37340"
},
{
"name": "oval:org.mitre.oval:def:6582",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"name": "37306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37306"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"name": "272909",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"name": "RHSA-2009:1561",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"name": "FEDORA-2009-11169",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"name": "oval:org.mitre.oval:def:10993",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"name": "FEDORA-2009-11243",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"name": "USN-861-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"name": "ADV-2009-3334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"name": "MDVSA-2009:294",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"name": "37340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37340"
},
{
"name": "oval:org.mitre.oval:def:6582",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"name": "37306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37306"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"name": "272909",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"name": "RHSA-2009:1561",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"name": "FEDORA-2009-11169",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"name": "oval:org.mitre.oval:def:10993",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"name": "FEDORA-2009-11243",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"name": "USN-861-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"name": "ADV-2009-3334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"name": "MDVSA-2009:294",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-3379",
"datePublished": "2009-10-29T14:00:00.000Z",
"dateReserved": "2009-09-24T00:00:00.000Z",
"dateUpdated": "2024-08-07T06:22:24.439Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-3379",
"date": "2026-05-19",
"epss": "0.04866",
"percentile": "0.89656"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades inespec\\u00edficas en libvorbis, tal y como se utiizan en Mozilla Firefox v3.5.x anteriores a v3.5.4, lo que permitir\\u00eda a atacantes remotos producir una denegaci\\u00f3n de servicio (ca\\u00edda de aplicaci\\u00f3n)o posiblemente la ejecuci\\u00f3n de c\\u00f3digo arbitrario a trav\\u00e9s de vectores desconocidos. NOTA: Esta vulnerabilidad se solapar\\u00eda con CVE-2009-2663.\"}]",
"id": "CVE-2009-3379",
"lastModified": "2024-11-21T01:07:13.427",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-10-29T14:30:01.047",
"references": "[{\"url\": \"http://secunia.com/advisories/37306\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37340\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:294\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1561.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-861-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3334\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=499512\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=500254\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=501279\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=507167\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=515889\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37306\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37340\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1561.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-861-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3334\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=499512\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=500254\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=501279\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=507167\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=515889\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-3379\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-10-29T14:30:01.047\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades inespec\u00edficas en libvorbis, tal y como se utiizan en Mozilla Firefox v3.5.x anteriores a v3.5.4, lo que permitir\u00eda a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n)o posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos. NOTA: Esta vulnerabilidad se solapar\u00eda con CVE-2009-2663.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/37306\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37340\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:294\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1561.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-861-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3334\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=499512\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=500254\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=501279\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=507167\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=515889\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1561.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-861-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=499512\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=500254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=501279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=507167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=515889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2009-AVI-459
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités de Mozilla Firefox ont été publiées. Certaines permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De nombreuses vulnérabilités de Mozilla Firefox ont été publiées :
- une erreur de traitement du formulaire d'historique permet de lire des informations sans en avoir le droit ;
- la prévisibilité des noms des fichiers téléchargés est exploitable par un utilisateur malveillant ayant un accès au système vulnérable pour exécuter du code arbitraire ;
- une mauvaise gestion de récursivité permet à un utilisateur malveillant de provoquer un déni de service, voire exécuter du code arbitraire ;
- un traitement défectueux des fichers de configuration automatique (PAC) permet à un utilisateur malveillant de provoquer un déni de service à distance, voire exécuter du code arbitraire, quand le navigateur est configuré pour utiliser ces fichiers ;
- une mauvaise analyse des images au format GIF permet à un utilisateur malveillant de provoquer un déni de service à distance, voire exécuter du code arbitraire ;
- le module XPCOM comporte un défaut exploitable pour exécuter des JavaScripts avec des privilèges élevés ;
- la conversion des chaînes de caractères en nombres en virgule flottante comporte un défaut exploitable pour exécuter du code arbitraire ;
- la fonction JavaScript document.getSelection ne respecte pas la politique de séparation des domaines ;
- le caractère unicode d'inversion du sens de lecture (Right to left override character) inclus dans un nom de fichier peut tromper l'utilisateur sur la nature de l'objet qu'il télécharge.
Solution
Les versions 3.0.15 et 3.5.4 remédient à ces problèmes.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Firefox, versions 3.0.x et 3.5.x.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eMozilla Firefox\u003c/SPAN\u003e, versions 3.0.x et 3.5.x.",
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s de Mozilla Firefox ont \u00e9t\u00e9 publi\u00e9es :\n\n- une erreur de traitement du formulaire d\u0027historique permet de lire\n des informations sans en avoir le droit\u00a0;\n- la pr\u00e9visibilit\u00e9 des noms des fichiers t\u00e9l\u00e9charg\u00e9s est exploitable\n par un utilisateur malveillant ayant un acc\u00e8s au syst\u00e8me vuln\u00e9rable\n pour ex\u00e9cuter du code arbitraire\u00a0;\n- une mauvaise gestion de r\u00e9cursivit\u00e9 permet \u00e0 un utilisateur\n malveillant de provoquer un d\u00e9ni de service, voire ex\u00e9cuter du code\n arbitraire\u00a0;\n- un traitement d\u00e9fectueux des fichers de configuration automatique\n (PAC) permet \u00e0 un utilisateur malveillant de provoquer un d\u00e9ni de\n service \u00e0 distance, voire ex\u00e9cuter du code arbitraire, quand le\n navigateur est configur\u00e9 pour utiliser ces fichiers\u00a0;\n- une mauvaise analyse des images au format GIF permet \u00e0 un\n utilisateur malveillant de provoquer un d\u00e9ni de service \u00e0 distance,\n voire ex\u00e9cuter du code arbitraire\u00a0;\n- le module XPCOM comporte un d\u00e9faut exploitable pour ex\u00e9cuter des\n JavaScripts avec des privil\u00e8ges \u00e9lev\u00e9s\u00a0;\n- la conversion des cha\u00eenes de caract\u00e8res en nombres en virgule\n flottante comporte un d\u00e9faut exploitable pour ex\u00e9cuter du code\n arbitraire\u00a0;\n- la fonction JavaScript document.getSelection ne respecte pas la\n politique de s\u00e9paration des domaines\u00a0;\n- le caract\u00e8re unicode d\u0027inversion du sens de lecture (Right to left\n override character) inclus dans un nom de fichier peut tromper\n l\u0027utilisateur sur la nature de l\u0027objet qu\u0027il t\u00e9l\u00e9charge.\n\n## Solution\n\nLes versions 3.0.15 et 3.5.4 rem\u00e9dient \u00e0 ces probl\u00e8mes.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3381",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3381"
},
{
"name": "CVE-2009-3375",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3375"
},
{
"name": "CVE-2009-3378",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3378"
},
{
"name": "CVE-2009-3380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3380"
},
{
"name": "CVE-2009-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3382"
},
{
"name": "CVE-2009-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3383"
},
{
"name": "CVE-2009-3377",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3377"
},
{
"name": "CVE-2009-3372",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3372"
},
{
"name": "CVE-2009-3376",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3376"
},
{
"name": "CVE-2009-3371",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3371"
},
{
"name": "CVE-2009-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1563"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
},
{
"name": "CVE-2009-3373",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3373"
},
{
"name": "CVE-2009-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3374"
},
{
"name": "CVE-2009-3370",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3370"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1922 du 28 octobre 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1922"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-56.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-54.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-55.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-52.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-61.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1530 du 27 octobre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1530.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-64.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-57.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-53.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-59.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-853-1 du 31 octobre 2009 :",
"url": "http://www.ubuntu.com/usn/USN-853-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1531 du 27 octobre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1531.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-62.html"
}
],
"reference": "CERTA-2009-AVI-459",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-10-28T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian, RedHat et Ubuntu.",
"revision_date": "2009-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s de \u003cspan class=\"textit\"\u003eMozilla\nFirefox\u003c/span\u003e ont \u00e9t\u00e9 publi\u00e9es. Certaines permettent \u00e0 un utilisateur\nmalveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla du 27 octobre 2009",
"url": null
}
]
}
CERTA-2009-AVI-517
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans la bibliothèque libvorbis permettent à un utilisateur disant malintentionné de provoquer un déni de service de l'application ou d'exécuter du code arbitraire au moyen d'un fichier au format ogg spécialement construit.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
libvorbis 1.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003elibvorbis 1.x.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2009",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2009"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1939 du 24 novembre 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1939"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1561 du 09 novembre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1561.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-861-1 du 24 novembre 2009 :",
"url": "http://www.ubuntulinux.org/usn/usn-861-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:052 du 04 novembre 2009 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html"
}
],
"reference": "CERTA-2009-AVI-517",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans la biblioth\u00e8que libvorbis\npermettent \u00e0 un utilisateur disant malintentionn\u00e9 de provoquer un d\u00e9ni\nde service de l\u0027application ou d\u0027ex\u00e9cuter du code arbitraire au moyen\nd\u0027un fichier au format ogg sp\u00e9cialement construit.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans la biblioth\u00e8que libvorbis",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1939 du 24 novembre 2009",
"url": null
}
]
}
CERTA-2010-AVI-024
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans Mozilla Thunderbird permettent l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird :
- plusieurs problèmes de stabilité affectent le moteur de rendu. Certains mènent à une corruption de la mémoire et permettent l'exécution de code arbitraire à distance ;
- des failles dans la bibliothèque liboggplay permettent l'exécution de code arbitraire à distance ;
- une vulnérabilité de type débordement d'entier dans la bibliothèque libtheora permet l'exécution de code arbitraire à distance. Un autre problème dans cette bibliothèque peut être exploité pour provoquer un déni de service à distance.
Il est à noté que ces vulnérabilités avaient déjà été corrigées dans Mozilla Thunderbird 3.5.6 et Mozilla SeaMonkey 2.0.1 (voir l'avis CERTA-2009-AVI-547).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Thunderbird 3.0
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMozilla Thunderbird 3.0\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Thunderbird\n:\n\n- plusieurs probl\u00e8mes de stabilit\u00e9 affectent le moteur de rendu.\n Certains m\u00e8nent \u00e0 une corruption de la m\u00e9moire et permettent\n l\u0027ex\u00e9cution de code arbitraire \u00e0 distance ;\n- des failles dans la biblioth\u00e8que liboggplay permettent l\u0027ex\u00e9cution\n de code arbitraire \u00e0 distance ;\n- une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier dans la biblioth\u00e8que\n libtheora permet l\u0027ex\u00e9cution de code arbitraire \u00e0 distance. Un autre\n probl\u00e8me dans cette biblioth\u00e8que peut \u00eatre exploit\u00e9 pour provoquer\n un d\u00e9ni de service \u00e0 distance.\n\nIl est \u00e0 not\u00e9 que ces vuln\u00e9rabilit\u00e9s avaient d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9es dans\nMozilla Thunderbird 3.5.6 et Mozilla SeaMonkey 2.0.1 (voir l\u0027avis\nCERTA-2009-AVI-547).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3381",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3381"
},
{
"name": "CVE-2009-3388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3388"
},
{
"name": "CVE-2009-3380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3380"
},
{
"name": "CVE-2009-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3382"
},
{
"name": "CVE-2009-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3389"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-66 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-66.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-67 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-67.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-65 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html"
}
],
"reference": "CERTA-2010-AVI-024",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird permettent\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird 3.0",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA2009-65, MFSA2009-66, MFSA2009-67",
"url": null
}
]
}
CERTA-2009-AVI-459
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités de Mozilla Firefox ont été publiées. Certaines permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De nombreuses vulnérabilités de Mozilla Firefox ont été publiées :
- une erreur de traitement du formulaire d'historique permet de lire des informations sans en avoir le droit ;
- la prévisibilité des noms des fichiers téléchargés est exploitable par un utilisateur malveillant ayant un accès au système vulnérable pour exécuter du code arbitraire ;
- une mauvaise gestion de récursivité permet à un utilisateur malveillant de provoquer un déni de service, voire exécuter du code arbitraire ;
- un traitement défectueux des fichers de configuration automatique (PAC) permet à un utilisateur malveillant de provoquer un déni de service à distance, voire exécuter du code arbitraire, quand le navigateur est configuré pour utiliser ces fichiers ;
- une mauvaise analyse des images au format GIF permet à un utilisateur malveillant de provoquer un déni de service à distance, voire exécuter du code arbitraire ;
- le module XPCOM comporte un défaut exploitable pour exécuter des JavaScripts avec des privilèges élevés ;
- la conversion des chaînes de caractères en nombres en virgule flottante comporte un défaut exploitable pour exécuter du code arbitraire ;
- la fonction JavaScript document.getSelection ne respecte pas la politique de séparation des domaines ;
- le caractère unicode d'inversion du sens de lecture (Right to left override character) inclus dans un nom de fichier peut tromper l'utilisateur sur la nature de l'objet qu'il télécharge.
Solution
Les versions 3.0.15 et 3.5.4 remédient à ces problèmes.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Firefox, versions 3.0.x et 3.5.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eMozilla Firefox\u003c/SPAN\u003e, versions 3.0.x et 3.5.x.",
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s de Mozilla Firefox ont \u00e9t\u00e9 publi\u00e9es :\n\n- une erreur de traitement du formulaire d\u0027historique permet de lire\n des informations sans en avoir le droit\u00a0;\n- la pr\u00e9visibilit\u00e9 des noms des fichiers t\u00e9l\u00e9charg\u00e9s est exploitable\n par un utilisateur malveillant ayant un acc\u00e8s au syst\u00e8me vuln\u00e9rable\n pour ex\u00e9cuter du code arbitraire\u00a0;\n- une mauvaise gestion de r\u00e9cursivit\u00e9 permet \u00e0 un utilisateur\n malveillant de provoquer un d\u00e9ni de service, voire ex\u00e9cuter du code\n arbitraire\u00a0;\n- un traitement d\u00e9fectueux des fichers de configuration automatique\n (PAC) permet \u00e0 un utilisateur malveillant de provoquer un d\u00e9ni de\n service \u00e0 distance, voire ex\u00e9cuter du code arbitraire, quand le\n navigateur est configur\u00e9 pour utiliser ces fichiers\u00a0;\n- une mauvaise analyse des images au format GIF permet \u00e0 un\n utilisateur malveillant de provoquer un d\u00e9ni de service \u00e0 distance,\n voire ex\u00e9cuter du code arbitraire\u00a0;\n- le module XPCOM comporte un d\u00e9faut exploitable pour ex\u00e9cuter des\n JavaScripts avec des privil\u00e8ges \u00e9lev\u00e9s\u00a0;\n- la conversion des cha\u00eenes de caract\u00e8res en nombres en virgule\n flottante comporte un d\u00e9faut exploitable pour ex\u00e9cuter du code\n arbitraire\u00a0;\n- la fonction JavaScript document.getSelection ne respecte pas la\n politique de s\u00e9paration des domaines\u00a0;\n- le caract\u00e8re unicode d\u0027inversion du sens de lecture (Right to left\n override character) inclus dans un nom de fichier peut tromper\n l\u0027utilisateur sur la nature de l\u0027objet qu\u0027il t\u00e9l\u00e9charge.\n\n## Solution\n\nLes versions 3.0.15 et 3.5.4 rem\u00e9dient \u00e0 ces probl\u00e8mes.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3381",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3381"
},
{
"name": "CVE-2009-3375",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3375"
},
{
"name": "CVE-2009-3378",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3378"
},
{
"name": "CVE-2009-3380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3380"
},
{
"name": "CVE-2009-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3382"
},
{
"name": "CVE-2009-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3383"
},
{
"name": "CVE-2009-3377",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3377"
},
{
"name": "CVE-2009-3372",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3372"
},
{
"name": "CVE-2009-3376",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3376"
},
{
"name": "CVE-2009-3371",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3371"
},
{
"name": "CVE-2009-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1563"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
},
{
"name": "CVE-2009-3373",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3373"
},
{
"name": "CVE-2009-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3374"
},
{
"name": "CVE-2009-3370",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3370"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1922 du 28 octobre 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1922"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-56.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-54.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-55.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-52.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-61.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1530 du 27 octobre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1530.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-64.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-57.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-53.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-59.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-853-1 du 31 octobre 2009 :",
"url": "http://www.ubuntu.com/usn/USN-853-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1531 du 27 octobre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1531.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-52 et suivants du 27 octobre 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-62.html"
}
],
"reference": "CERTA-2009-AVI-459",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-10-28T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian, RedHat et Ubuntu.",
"revision_date": "2009-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s de \u003cspan class=\"textit\"\u003eMozilla\nFirefox\u003c/span\u003e ont \u00e9t\u00e9 publi\u00e9es. Certaines permettent \u00e0 un utilisateur\nmalveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla du 27 octobre 2009",
"url": null
}
]
}
CERTA-2009-AVI-517
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans la bibliothèque libvorbis permettent à un utilisateur disant malintentionné de provoquer un déni de service de l'application ou d'exécuter du code arbitraire au moyen d'un fichier au format ogg spécialement construit.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
libvorbis 1.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003elibvorbis 1.x.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2009",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2009"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1939 du 24 novembre 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1939"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1561 du 09 novembre 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1561.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-861-1 du 24 novembre 2009 :",
"url": "http://www.ubuntulinux.org/usn/usn-861-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:052 du 04 novembre 2009 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html"
}
],
"reference": "CERTA-2009-AVI-517",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans la biblioth\u00e8que libvorbis\npermettent \u00e0 un utilisateur disant malintentionn\u00e9 de provoquer un d\u00e9ni\nde service de l\u0027application ou d\u0027ex\u00e9cuter du code arbitraire au moyen\nd\u0027un fichier au format ogg sp\u00e9cialement construit.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans la biblioth\u00e8que libvorbis",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1939 du 24 novembre 2009",
"url": null
}
]
}
CERTA-2010-AVI-024
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans Mozilla Thunderbird permettent l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird :
- plusieurs problèmes de stabilité affectent le moteur de rendu. Certains mènent à une corruption de la mémoire et permettent l'exécution de code arbitraire à distance ;
- des failles dans la bibliothèque liboggplay permettent l'exécution de code arbitraire à distance ;
- une vulnérabilité de type débordement d'entier dans la bibliothèque libtheora permet l'exécution de code arbitraire à distance. Un autre problème dans cette bibliothèque peut être exploité pour provoquer un déni de service à distance.
Il est à noté que ces vulnérabilités avaient déjà été corrigées dans Mozilla Thunderbird 3.5.6 et Mozilla SeaMonkey 2.0.1 (voir l'avis CERTA-2009-AVI-547).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Thunderbird 3.0
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMozilla Thunderbird 3.0\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Thunderbird\n:\n\n- plusieurs probl\u00e8mes de stabilit\u00e9 affectent le moteur de rendu.\n Certains m\u00e8nent \u00e0 une corruption de la m\u00e9moire et permettent\n l\u0027ex\u00e9cution de code arbitraire \u00e0 distance ;\n- des failles dans la biblioth\u00e8que liboggplay permettent l\u0027ex\u00e9cution\n de code arbitraire \u00e0 distance ;\n- une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier dans la biblioth\u00e8que\n libtheora permet l\u0027ex\u00e9cution de code arbitraire \u00e0 distance. Un autre\n probl\u00e8me dans cette biblioth\u00e8que peut \u00eatre exploit\u00e9 pour provoquer\n un d\u00e9ni de service \u00e0 distance.\n\nIl est \u00e0 not\u00e9 que ces vuln\u00e9rabilit\u00e9s avaient d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9es dans\nMozilla Thunderbird 3.5.6 et Mozilla SeaMonkey 2.0.1 (voir l\u0027avis\nCERTA-2009-AVI-547).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3381",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3381"
},
{
"name": "CVE-2009-3388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3388"
},
{
"name": "CVE-2009-3380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3380"
},
{
"name": "CVE-2009-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3382"
},
{
"name": "CVE-2009-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3389"
},
{
"name": "CVE-2009-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3379"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-66 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-66.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-67 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-67.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/MFSA2009-65 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-65.html"
}
],
"reference": "CERTA-2010-AVI-024",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird permettent\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird 3.0",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA2009-65, MFSA2009-66, MFSA2009-67",
"url": null
}
]
}
FKIE_CVE-2009-3379
Vulnerability from fkie_nvd - Published: 2009-10-29 14:30 - Updated: 2026-04-23 00:35| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://secunia.com/advisories/37306 | ||
| cve@mitre.org | http://secunia.com/advisories/37340 | ||
| cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:294 | ||
| cve@mitre.org | http://www.mozilla.org/security/announce/2009/mfsa2009-63.html | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1561.html | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-861-1 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/3334 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=499512 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=500254 | Patch | |
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=501279 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=507167 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=515889 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582 | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37306 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37340 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:294 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2009/mfsa2009-63.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1561.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-861-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3334 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=499512 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=500254 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=501279 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=507167 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=515889 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "031E8624-5161-43AF-AF19-6BAB5A94FDD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54186D4A-C6F0-44AD-94FB-73B4346ABB6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47E50AD9-BA35-4817-BD4D-5D678FC5A3C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades inespec\u00edficas en libvorbis, tal y como se utiizan en Mozilla Firefox v3.5.x anteriores a v3.5.4, lo que permitir\u00eda a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n)o posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos. NOTA: Esta vulnerabilidad se solapar\u00eda con CVE-2009-2663."
}
],
"id": "CVE-2009-3379",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-10-29T14:30:01.047",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37306"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37340"
},
{
"source": "cve@mitre.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-F7FV-7RMR-MPCF
Vulnerability from github – Published: 2022-05-02 03:44 – Updated: 2022-05-02 03:44Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.
{
"affected": [],
"aliases": [
"CVE-2009-3379"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-10-29T14:30:00Z",
"severity": "HIGH"
},
"details": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.",
"id": "GHSA-f7fv-7rmr-mpcf",
"modified": "2022-05-02T03:44:36Z",
"published": "2022-05-02T03:44:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3379"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37306"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37340"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3334"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2009-3379
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-3379",
"description": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.",
"id": "GSD-2009-3379",
"references": [
"https://www.suse.com/security/cve/CVE-2009-3379.html",
"https://www.debian.org/security/2009/dsa-1939",
"https://access.redhat.com/errata/RHSA-2009:1561",
"https://linux.oracle.com/cve/CVE-2009-3379.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-3379"
],
"details": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.",
"id": "GSD-2009-3379",
"modified": "2023-12-13T01:19:48.940539Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"name": "37340",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37340"
},
{
"name": "oval:org.mitre.oval:def:6582",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"name": "37306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37306"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"name": "272909",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"name": "RHSA-2009:1561",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"name": "FEDORA-2009-11169",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"name": "oval:org.mitre.oval:def:10993",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
},
{
"name": "FEDORA-2009-11243",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"name": "USN-861-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"name": "ADV-2009-3334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"name": "MDVSA-2009:294",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3379"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=501279"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-63.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507167"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=500254"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515889"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=499512"
},
{
"name": "RHSA-2009:1561",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1561.html"
},
{
"name": "37340",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37340"
},
{
"name": "FEDORA-2009-11169",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00315.html"
},
{
"name": "FEDORA-2009-11243",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00369.html"
},
{
"name": "37306",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37306"
},
{
"name": "MDVSA-2009:294",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:294"
},
{
"name": "ADV-2009-3334",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3334"
},
{
"name": "272909",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1"
},
{
"name": "USN-861-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-861-1"
},
{
"name": "oval:org.mitre.oval:def:6582",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6582"
},
{
"name": "oval:org.mitre.oval:def:10993",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10993"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-09-19T01:29Z",
"publishedDate": "2009-10-29T14:30Z"
}
}
}
OPENSUSE-SU-2024:10024-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2008-1420/ | self |
| https://www.suse.com/security/cve/CVE-2009-3379/ | self |
| https://www.suse.com/security/cve/CVE-2012-0444/ | self |
| https://www.suse.com/security/cve/CVE-2008-1420 | external |
| https://bugzilla.suse.com/372246 | external |
| https://www.suse.com/security/cve/CVE-2009-3379 | external |
| https://bugzilla.suse.com/522109 | external |
| https://bugzilla.suse.com/545277 | external |
| https://bugzilla.suse.com/608192 | external |
| https://www.suse.com/security/cve/CVE-2012-0444 | external |
| https://bugzilla.suse.com/744275 | external |
| https://bugzilla.suse.com/747912 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libvorbis-devel-1.3.5-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libvorbis-devel-1.3.5-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10024",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10024-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1420 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3379 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0444 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0444/"
}
],
"title": "libvorbis-devel-1.3.5-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10024-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvorbis-devel-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbis-devel-1.3.5-2.1.aarch64",
"product_id": "libvorbis-devel-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"product_id": "libvorbis-devel-32bit-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbis-doc-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbis-doc-1.3.5-2.1.aarch64",
"product_id": "libvorbis-doc-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbis0-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbis0-1.3.5-2.1.aarch64",
"product_id": "libvorbis0-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbis0-32bit-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbis0-32bit-1.3.5-2.1.aarch64",
"product_id": "libvorbis0-32bit-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbisenc2-1.3.5-2.1.aarch64",
"product_id": "libvorbisenc2-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"product_id": "libvorbisenc2-32bit-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbisfile3-1.3.5-2.1.aarch64",
"product_id": "libvorbisfile3-1.3.5-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"product": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"product_id": "libvorbisfile3-32bit-1.3.5-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvorbis-devel-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbis-devel-1.3.5-2.1.ppc64le",
"product_id": "libvorbis-devel-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"product_id": "libvorbis-devel-32bit-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbis-doc-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbis-doc-1.3.5-2.1.ppc64le",
"product_id": "libvorbis-doc-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbis0-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbis0-1.3.5-2.1.ppc64le",
"product_id": "libvorbis0-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbis0-32bit-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbis0-32bit-1.3.5-2.1.ppc64le",
"product_id": "libvorbis0-32bit-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbisenc2-1.3.5-2.1.ppc64le",
"product_id": "libvorbisenc2-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"product_id": "libvorbisenc2-32bit-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbisfile3-1.3.5-2.1.ppc64le",
"product_id": "libvorbisfile3-1.3.5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"product": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"product_id": "libvorbisfile3-32bit-1.3.5-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvorbis-devel-1.3.5-2.1.s390x",
"product": {
"name": "libvorbis-devel-1.3.5-2.1.s390x",
"product_id": "libvorbis-devel-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbis-devel-32bit-1.3.5-2.1.s390x",
"product": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.s390x",
"product_id": "libvorbis-devel-32bit-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbis-doc-1.3.5-2.1.s390x",
"product": {
"name": "libvorbis-doc-1.3.5-2.1.s390x",
"product_id": "libvorbis-doc-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbis0-1.3.5-2.1.s390x",
"product": {
"name": "libvorbis0-1.3.5-2.1.s390x",
"product_id": "libvorbis0-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbis0-32bit-1.3.5-2.1.s390x",
"product": {
"name": "libvorbis0-32bit-1.3.5-2.1.s390x",
"product_id": "libvorbis0-32bit-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-1.3.5-2.1.s390x",
"product": {
"name": "libvorbisenc2-1.3.5-2.1.s390x",
"product_id": "libvorbisenc2-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-32bit-1.3.5-2.1.s390x",
"product": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.s390x",
"product_id": "libvorbisenc2-32bit-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-1.3.5-2.1.s390x",
"product": {
"name": "libvorbisfile3-1.3.5-2.1.s390x",
"product_id": "libvorbisfile3-1.3.5-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-32bit-1.3.5-2.1.s390x",
"product": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.s390x",
"product_id": "libvorbisfile3-32bit-1.3.5-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvorbis-devel-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbis-devel-1.3.5-2.1.x86_64",
"product_id": "libvorbis-devel-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"product_id": "libvorbis-devel-32bit-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbis-doc-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbis-doc-1.3.5-2.1.x86_64",
"product_id": "libvorbis-doc-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbis0-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbis0-1.3.5-2.1.x86_64",
"product_id": "libvorbis0-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbis0-32bit-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbis0-32bit-1.3.5-2.1.x86_64",
"product_id": "libvorbis0-32bit-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbisenc2-1.3.5-2.1.x86_64",
"product_id": "libvorbisenc2-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"product_id": "libvorbisenc2-32bit-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbisfile3-1.3.5-2.1.x86_64",
"product_id": "libvorbisfile3-1.3.5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvorbisfile3-32bit-1.3.5-2.1.x86_64",
"product": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.x86_64",
"product_id": "libvorbisfile3-32bit-1.3.5-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbis-devel-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbis-devel-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x"
},
"product_reference": "libvorbis-devel-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbis-devel-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x"
},
"product_reference": "libvorbis-devel-32bit-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-devel-32bit-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-doc-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbis-doc-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-doc-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbis-doc-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-doc-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x"
},
"product_reference": "libvorbis-doc-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis-doc-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbis-doc-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbis0-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbis0-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x"
},
"product_reference": "libvorbis0-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbis0-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-32bit-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbis0-32bit-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-32bit-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbis0-32bit-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-32bit-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x"
},
"product_reference": "libvorbis0-32bit-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbis0-32bit-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbis0-32bit-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbisenc2-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbisenc2-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x"
},
"product_reference": "libvorbisenc2-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbisenc2-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x"
},
"product_reference": "libvorbisenc2-32bit-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisenc2-32bit-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbisfile3-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbisfile3-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x"
},
"product_reference": "libvorbisfile3-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbisfile3-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64"
},
"product_reference": "libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le"
},
"product_reference": "libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x"
},
"product_reference": "libvorbisfile3-32bit-1.3.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvorbisfile3-32bit-1.3.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
},
"product_reference": "libvorbisfile3-32bit-1.3.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1420"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1420",
"url": "https://www.suse.com/security/cve/CVE-2008-1420"
},
{
"category": "external",
"summary": "SUSE Bug 372246 for CVE-2008-1420",
"url": "https://bugzilla.suse.com/372246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-1420"
},
{
"cve": "CVE-2009-3379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3379"
}
],
"notes": [
{
"category": "general",
"text": "Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3379",
"url": "https://www.suse.com/security/cve/CVE-2009-3379"
},
{
"category": "external",
"summary": "SUSE Bug 522109 for CVE-2009-3379",
"url": "https://bugzilla.suse.com/522109"
},
{
"category": "external",
"summary": "SUSE Bug 545277 for CVE-2009-3379",
"url": "https://bugzilla.suse.com/545277"
},
{
"category": "external",
"summary": "SUSE Bug 608192 for CVE-2009-3379",
"url": "https://bugzilla.suse.com/608192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-3379"
},
{
"cve": "CVE-2012-0444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0444"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0444",
"url": "https://www.suse.com/security/cve/CVE-2012-0444"
},
{
"category": "external",
"summary": "SUSE Bug 744275 for CVE-2012-0444",
"url": "https://bugzilla.suse.com/744275"
},
{
"category": "external",
"summary": "SUSE Bug 747912 for CVE-2012-0444",
"url": "https://bugzilla.suse.com/747912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-devel-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis-doc-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbis0-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisenc2-32bit-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-1.3.5-2.1.x86_64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.aarch64",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.ppc64le",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.s390x",
"openSUSE Tumbleweed:libvorbisfile3-32bit-1.3.5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2012-0444"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.