Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-0287 (GCVE-0-2015-0287)
Vulnerability from cvelistv5 – Published: 2015-03-19 00:00 – Updated: 2024-08-06 04:03- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "RHSA-2015:0715",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"name": "openSUSE-SU-2015:0554",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"name": "DSA-3197",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"name": "USN-2537-1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"name": "HPSBMU03409",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"name": "FEDORA-2015-4303",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/HT205212"
},
{
"name": "73227",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/73227"
},
{
"name": "APPLE-SA-2015-09-30-3",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "HPSBMU03380",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "FEDORA-2015-4300",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"name": "APPLE-SA-2015-06-30-2",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "FEDORA-2015-6951",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"name": "openSUSE-SU-2016:0640",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://access.redhat.com/articles/1384453"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "openSUSE-SU-2015:1277",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/HT205267"
},
{
"name": "HPSBUX03334",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "MDVSA-2015:063",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"name": "SUSE-SU-2015:0541",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "RHSA-2015:0716",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"name": "HPSBGN03306",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"tags": [
"x_transferred"
],
"url": "http://support.apple.com/kb/HT204942"
},
{
"name": "SUSE-SU-2015:0578",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"name": "FreeBSD-SA-15:06",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"name": "HPSBMU03397",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "RHSA-2015:0752",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"name": "RHSA-2015:0800",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"name": "1031929",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031929"
},
{
"name": "SSRT102000",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "APPLE-SA-2015-09-16-1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name": "MDVSA-2015:062",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name": "FEDORA-2015-4320",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX216642"
},
{
"name": "SUSE-SU-2016:0678",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name": "FEDORA-2015-6855",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"name": "GLSA-201503-11",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-03-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-13T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "RHSA-2015:0715",
"tags": [
"vendor-advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"name": "openSUSE-SU-2015:0554",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"name": "DSA-3197",
"tags": [
"vendor-advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"name": "USN-2537-1",
"tags": [
"vendor-advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"name": "HPSBMU03409",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"name": "FEDORA-2015-4303",
"tags": [
"vendor-advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"url": "https://support.apple.com/HT205212"
},
{
"name": "73227",
"tags": [
"vdb-entry"
],
"url": "http://www.securityfocus.com/bid/73227"
},
{
"name": "APPLE-SA-2015-09-30-3",
"tags": [
"vendor-advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "HPSBMU03380",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "FEDORA-2015-4300",
"tags": [
"vendor-advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"name": "APPLE-SA-2015-06-30-2",
"tags": [
"vendor-advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "FEDORA-2015-6951",
"tags": [
"vendor-advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"name": "openSUSE-SU-2016:0640",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"url": "https://access.redhat.com/articles/1384453"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "openSUSE-SU-2015:1277",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"url": "https://support.apple.com/HT205267"
},
{
"name": "HPSBUX03334",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "MDVSA-2015:063",
"tags": [
"vendor-advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"name": "SUSE-SU-2015:0541",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "RHSA-2015:0716",
"tags": [
"vendor-advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"name": "HPSBGN03306",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"url": "http://support.apple.com/kb/HT204942"
},
{
"name": "SUSE-SU-2015:0578",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"name": "FreeBSD-SA-15:06",
"tags": [
"vendor-advisory"
],
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"name": "HPSBMU03397",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "RHSA-2015:0752",
"tags": [
"vendor-advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"name": "RHSA-2015:0800",
"tags": [
"vendor-advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"name": "1031929",
"tags": [
"vdb-entry"
],
"url": "http://www.securitytracker.com/id/1031929"
},
{
"name": "SSRT102000",
"tags": [
"vendor-advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "APPLE-SA-2015-09-16-1",
"tags": [
"vendor-advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name": "MDVSA-2015:062",
"tags": [
"vendor-advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name": "FEDORA-2015-4320",
"tags": [
"vendor-advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"url": "https://support.citrix.com/article/CTX216642"
},
{
"name": "SUSE-SU-2016:0678",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name": "FEDORA-2015-6855",
"tags": [
"vendor-advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"name": "GLSA-201503-11",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2015-0287",
"datePublished": "2015-03-19T00:00:00.000Z",
"dateReserved": "2014-11-18T00:00:00.000Z",
"dateUpdated": "2024-08-06T04:03:10.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2015-0287
Vulnerability from fkie_nvd - Published: 2015-03-19 22:59 - Updated: 2025-04-12 10:46| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680 | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=142841429220765&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=143213830203296&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=143748090628601&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=144050155601375&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=144050297101809&w=2 | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-0715.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-0716.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-0752.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-0800.html | ||
| secalert@redhat.com | http://support.apple.com/kb/HT204942 | ||
| secalert@redhat.com | http://www.debian.org/security/2015/dsa-3197 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:063 | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/73227 | ||
| secalert@redhat.com | http://www.securitytracker.com/id/1031929 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-2537-1 | ||
| secalert@redhat.com | https://access.redhat.com/articles/1384453 | ||
| secalert@redhat.com | https://bto.bluecoat.com/security-advisory/sa92 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1202380 | ||
| secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | ||
| secalert@redhat.com | https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f | ||
| secalert@redhat.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10110 | ||
| secalert@redhat.com | https://security.gentoo.org/glsa/201503-11 | ||
| secalert@redhat.com | https://support.apple.com/HT205212 | ||
| secalert@redhat.com | https://support.apple.com/HT205267 | ||
| secalert@redhat.com | https://support.citrix.com/article/CTX216642 | ||
| secalert@redhat.com | https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc | ||
| secalert@redhat.com | https://www.openssl.org/news/secadv_20150319.txt | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142841429220765&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=143213830203296&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=143748090628601&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=144050155601375&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=144050297101809&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0715.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0716.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0752.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0800.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT204942 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3197 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:063 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/73227 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1031929 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2537-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/articles/1384453 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa92 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1202380 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10110 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201503-11 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT205212 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT205267 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX216642 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.openssl.org/news/secadv_20150319.txt | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| openssl | openssl | * | |
| openssl | openssl | 1.0.0 | |
| openssl | openssl | 1.0.0a | |
| openssl | openssl | 1.0.0b | |
| openssl | openssl | 1.0.0c | |
| openssl | openssl | 1.0.0d | |
| openssl | openssl | 1.0.0e | |
| openssl | openssl | 1.0.0f | |
| openssl | openssl | 1.0.0g | |
| openssl | openssl | 1.0.0h | |
| openssl | openssl | 1.0.0i | |
| openssl | openssl | 1.0.0j | |
| openssl | openssl | 1.0.0k | |
| openssl | openssl | 1.0.0l | |
| openssl | openssl | 1.0.0m | |
| openssl | openssl | 1.0.0n | |
| openssl | openssl | 1.0.0o | |
| openssl | openssl | 1.0.0p | |
| openssl | openssl | 1.0.0q | |
| openssl | openssl | 1.0.1 | |
| openssl | openssl | 1.0.1a | |
| openssl | openssl | 1.0.1b | |
| openssl | openssl | 1.0.1c | |
| openssl | openssl | 1.0.1d | |
| openssl | openssl | 1.0.1e | |
| openssl | openssl | 1.0.1f | |
| openssl | openssl | 1.0.1g | |
| openssl | openssl | 1.0.1h | |
| openssl | openssl | 1.0.1i | |
| openssl | openssl | 1.0.1j | |
| openssl | openssl | 1.0.1k | |
| openssl | openssl | 1.0.1l | |
| openssl | openssl | 1.0.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2907ED-57AA-41E4-9AC6-055F138B9204",
"versionEndIncluding": "0.9.8ze",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"matchCriteriaId": "10FF0A06-DA61-4250-B083-67E55E362677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6BA453-C150-4159-B80B-5465EFF83F11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"matchCriteriaId": "638A2E69-8AB6-4FEA-852A-FEF16A500C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"matchCriteriaId": "56C47D3A-B99D-401D-B6B8-1194B2DB4809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "08355B10-E004-4BE6-A5AE-4D428810580B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"matchCriteriaId": "738BCFDC-1C49-4774-95AE-E099F707DEF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B242C0-D27D-4644-AD19-5ACB853C9DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC683F2-4346-4E5E-A8D7-67B4F4D7827B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"matchCriteriaId": "764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"matchCriteriaId": "6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"matchCriteriaId": "132B9217-B0E0-4E3E-9096-162AA28E158E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"matchCriteriaId": "7619F9A0-9054-4217-93D1-3EA64876C5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"matchCriteriaId": "6D82C405-17E2-4DF1-8DF5-315BD5A41595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"matchCriteriaId": "4C96806F-4718-4BD3-9102-55A26AA86498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"matchCriteriaId": "8A16CD99-AF7F-4931-AD2E-77727BA18FBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*",
"matchCriteriaId": "88440697-754A-47A7-BF83-4D0EB68FFB10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*",
"matchCriteriaId": "AD51F0FC-F426-4AE5-B3B9-B813C580EBAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1C00C0-C77E-4255-9ECA-20F2673C7366",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "C684FB18-FDDC-4BED-A28C-C23EE6CD0094",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "A74A79A7-4FAF-4C81-8622-050008B96AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "CEDACCB9-8D61-49EE-9957-9E58BC7BB031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4993DD56-F9E3-4AC8-AC3E-BF204B950DEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "E884B241-F9C3-44F8-A420-DE65F5F3D660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "3A383620-B4F7-44A7-85DA-A4FF2E115D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"matchCriteriaId": "5F0C6812-F455-49CF-B29B-9AC00306DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2D462C-A1B4-4572-A615-BDE9DC5F1E55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"matchCriteriaId": "3703E445-17C0-4C85-A496-A35641C0C8DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"matchCriteriaId": "2F4034B9-EF1C-40E6-B92A-D4D7B7E7E774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEC1927-F469-4B9E-B544-DA6CF90F0B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse."
},
{
"lang": "es",
"value": "La funci\u00f3n ASN1_item_ex_d2i en crypto/asn1/tasn_dec.c en OpenSSL anterior a 0.9.8zf, 1.0.0 anterior a 1.0.0r, 1.0.1 anterior a 1.0.1m, y 1.0.2 anterior a 1.0.2a no reinicializa estructuras de datos CHOICE y ADB, lo que podr\u00eda permitir a atacantes causar una denegaci\u00f3n de servicio (operaci\u00f3n de escritura inv\u00e1lida y corrupci\u00f3n de memoria) mediante el aprovechamiento de una aplicaci\u00f3n que depende del reuso de estructuras ASN.1."
}
],
"id": "CVE-2015-0287",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-03-19T22:59:05.770",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT204942"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/73227"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id/1031929"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/articles/1384453"
},
{
"source": "secalert@redhat.com",
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"source": "secalert@redhat.com",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
},
{
"source": "secalert@redhat.com",
"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"source": "secalert@redhat.com",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"source": "secalert@redhat.com",
"url": "https://support.apple.com/HT205212"
},
{
"source": "secalert@redhat.com",
"url": "https://support.apple.com/HT205267"
},
{
"source": "secalert@redhat.com",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "secalert@redhat.com",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT204942"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/73227"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/articles/1384453"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/HT205212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/HT205267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.openssl.org/news/secadv_20150319.txt"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-17"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2015-AVI-259
Vulnerability from certfr_avis - Published: 2015-06-17 - Updated: 2015-06-17
De multiples vulnérabilités ont été corrigées dans les produits BlueCoat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Bluecoat | N/A | PacketShaper S-Series 11.2, 11.3, et 11.4 | ||
| Bluecoat | N/A | OPIC | ||
| Bluecoat | N/A | SSLV 3.7 et 3.8 versions antérieures à 3.8.2-418 et 3.8.3-120 | ||
| Bluecoat | N/A | NSP 5.2 et 5.3 | ||
| Bluecoat | N/A | Android Mobile Agent 1.x | ||
| Bluecoat | N/A | SA 6.6, 7.0, et 7.1 | ||
| Bluecoat | N/A | ProxyClient 3.4 | ||
| Bluecoat | N/A | PacketShaper 9.2 | ||
| Bluecoat | N/A | Client Connector | ||
| Bluecoat | N/A | IntelligenceCenter 3.2 et 3.3 | ||
| Bluecoat | N/A | ProxyAV 3.4 et 3.5 | ||
| Bluecoat | N/A | SGOS 6.2 versions antérieures à 6.2.16.4, 6.5 versions antérieures à 6.5.7.5, et 6.6 | ||
| Bluecoat | N/A | Reporter (Virtualized Reporter) 9.4 | ||
| Bluecoat | N/A | NNP 5.2 et 5.3 | ||
| Bluecoat | N/A | CAS 1.1 versions antérieures à 1.1.5.6 et 1.2 versions antérieures 1.2.4.4 | ||
| Bluecoat | N/A | BCAAA 5.5 et 6.1 | ||
| Bluecoat | N/A | CacheFlow 2.x et 3.x | ||
| Bluecoat | N/A | MAA 4.1 et 4.2 | ||
| Bluecoat | N/A | MAG2 | ||
| Bluecoat | N/A | ICSP 5.3 | ||
| Bluecoat | N/A | Director 6.1 versions antérieures 6.1.19.1 | ||
| Bluecoat | N/A | PolicyCenter 9.2 | ||
| Bluecoat | N/A | Management Center versions antérieures 1.3.3.2 | ||
| Bluecoat | N/A | Unified Agent 4.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PacketShaper S-Series 11.2, 11.3, et 11.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "OPIC",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "SSLV 3.7 et 3.8 versions ant\u00e9rieures \u00e0 3.8.2-418 et 3.8.3-120",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "NSP 5.2 et 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Android Mobile Agent 1.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "SA 6.6, 7.0, et 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "ProxyClient 3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "PacketShaper 9.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Client Connector",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "IntelligenceCenter 3.2 et 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "ProxyAV 3.4 et 3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "SGOS 6.2 versions ant\u00e9rieures \u00e0 6.2.16.4, 6.5 versions ant\u00e9rieures \u00e0 6.5.7.5, et 6.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Reporter (Virtualized Reporter) 9.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "NNP 5.2 et 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "CAS 1.1 versions ant\u00e9rieures \u00e0 1.1.5.6 et 1.2 versions ant\u00e9rieures 1.2.4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "BCAAA 5.5 et 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "CacheFlow 2.x et 3.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "MAA 4.1 et 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "MAG2",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "ICSP 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Director 6.1 versions ant\u00e9rieures 6.1.19.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "PolicyCenter 9.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Management Center versions ant\u00e9rieures 1.3.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
},
{
"description": "Unified Agent 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Bluecoat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
}
],
"initial_release_date": "2015-06-17T00:00:00",
"last_revision_date": "2015-06-17T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-259",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits BlueCoat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA92 du 16 juin 2015",
"url": "https://bto.bluecoat.com/security-advisory/sa92"
}
]
}
CERTFR-2015-AVI-273
Vulnerability from certfr_avis - Published: 2015-07-01 - Updated: 2015-07-01
De multiples vulnérabilités ont été corrigées dans Apple OSX. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OS X Mountain Lion versions ant\u00e9rieures \u00e0 v10.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Yosemite versions ant\u00e9rieures \u00e0 v10.10.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Mavericks versions ant\u00e9rieures \u00e0 v10.9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3687"
},
{
"name": "CVE-2015-3686",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3686"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2015-3680",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3680"
},
{
"name": "CVE-2015-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3676"
},
{
"name": "CVE-2013-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1741"
},
{
"name": "CVE-2015-3668",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3668"
},
{
"name": "CVE-2015-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3679"
},
{
"name": "CVE-2015-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3714"
},
{
"name": "CVE-2015-3685",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3685"
},
{
"name": "CVE-2014-8130",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8130"
},
{
"name": "CVE-2015-3681",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3681"
},
{
"name": "CVE-2015-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3706"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-3690",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3690"
},
{
"name": "CVE-2014-8129",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8129"
},
{
"name": "CVE-2015-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3682"
},
{
"name": "CVE-2015-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3667"
},
{
"name": "CVE-2015-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3691"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-3689",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3689"
},
{
"name": "CVE-2015-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3720"
},
{
"name": "CVE-2015-3700",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3700"
},
{
"name": "CVE-2015-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3710"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3695"
},
{
"name": "CVE-2015-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3708"
},
{
"name": "CVE-2015-3694",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3694"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2015-0273",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0273"
},
{
"name": "CVE-2014-8128",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8128"
},
{
"name": "CVE-2015-3719",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3719"
},
{
"name": "CVE-2015-3674",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3674"
},
{
"name": "CVE-2015-1798",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1798"
},
{
"name": "CVE-2015-1799",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1799"
},
{
"name": "CVE-2015-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3721"
},
{
"name": "CVE-2015-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3684"
},
{
"name": "CVE-2015-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3677"
},
{
"name": "CVE-2015-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3671"
},
{
"name": "CVE-2015-3697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3697"
},
{
"name": "CVE-2015-3666",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3666"
},
{
"name": "CVE-2015-3675",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3675"
},
{
"name": "CVE-2015-3662",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3662"
},
{
"name": "CVE-2015-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3688"
},
{
"name": "CVE-2015-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3673"
},
{
"name": "CVE-2015-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3661"
},
{
"name": "CVE-2015-3701",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3701"
},
{
"name": "CVE-2015-3717",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3717"
},
{
"name": "CVE-2015-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3718"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3715"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3672"
},
{
"name": "CVE-2015-3716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3716"
},
{
"name": "CVE-2015-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1157"
},
{
"name": "CVE-2015-3713",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3713"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2015-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3699"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0235"
},
{
"name": "CVE-2015-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3693"
},
{
"name": "CVE-2014-8127",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8127"
},
{
"name": "CVE-2015-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3707"
},
{
"name": "CVE-2015-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3709"
},
{
"name": "CVE-2015-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3711"
},
{
"name": "CVE-2015-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3705"
},
{
"name": "CVE-2015-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3712"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2015-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3703"
},
{
"name": "CVE-2015-3696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3696"
},
{
"name": "CVE-2015-3678",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3678"
},
{
"name": "CVE-2015-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3698"
},
{
"name": "CVE-2015-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3663"
},
{
"name": "CVE-2015-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3704"
},
{
"name": "CVE-2015-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3702"
},
{
"name": "CVE-2015-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3683"
},
{
"name": "CVE-2015-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3692"
}
],
"initial_release_date": "2015-07-01T00:00:00",
"last_revision_date": "2015-07-01T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-273",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-07-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OSX\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OSX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT204942 du 30 juin 2015",
"url": "https://support.apple.com/en-us/HT204942"
}
]
}
CERTFR-2015-AVI-177
Vulnerability from certfr_avis - Published: 2015-04-16 - Updated: 2015-04-16
De multiples vulnérabilités ont été corrigées dans les produits IBM AIX et Virtual I/O Server. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM AIX versions 6.1 et ant\u00e9rieures",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM AIX versions 5.3 et ant\u00e9rieures",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM AIX versions 7.1 et ant\u00e9rieures",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM VIOS versions 2.2 et ant\u00e9rieures",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
}
],
"initial_release_date": "2015-04-16T00:00:00",
"last_revision_date": "2015-04-16T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-177",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eIBM AIX et Virtual I/O Server\u003c/span\u003e. Elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM AIX et Virtual I/O Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM IV71446 du 13 avril 2015",
"url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc"
}
]
}
CERTFR-2015-AVI-146
Vulnerability from certfr_avis - Published: 2015-04-13 - Updated: 2015-04-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R12 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R9 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 6.6R5 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2X50-D70 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 11.4R12 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X51-D30 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R7 | ||
| Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R11 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R10 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R6 | ||
| Juniper Networks | N/A | Juniper CTPView versions antérieures à 7.1R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R6 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3X48-D10 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.0R4 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1X53-D10 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X46-D35 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X47-D25 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R5 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.1R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R5 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X52-D15 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R3 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R3 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R8 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2R9 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.1X50-D30 | ||
| Juniper Networks | N/A | Juniper IDP OS versions antérieures à 5.1r4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R12",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 6.6R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2X50-D70",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 11.4R12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R11",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPView versions ant\u00e9rieures \u00e0 7.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D35",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D15",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.1X50-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper IDP OS versions ant\u00e9rieures \u00e0 5.1r4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2014-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3571"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-3002",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3002"
},
{
"name": "CVE-2014-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3570"
},
{
"name": "CVE-2015-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3004"
},
{
"name": "CVE-2009-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0206"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2011-0539",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0539"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2010-4478",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4478"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2014-4478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4478"
},
{
"name": "CVE-2015-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3003"
},
{
"name": "CVE-2012-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0814"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2014-8275",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8275"
},
{
"name": "CVE-2015-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0205"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2014-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3572"
},
{
"name": "CVE-2014-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3569"
},
{
"name": "CVE-2015-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3005"
},
{
"name": "CVE-2014-8500",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8500"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
},
{
"name": "CVE-2015-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3006"
}
],
"initial_release_date": "2015-04-13T00:00:00",
"last_revision_date": "2015-04-13T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-146",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10679 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10679"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10676 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10676"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10673 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10672 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10672"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10680 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10677 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10677"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10678 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10678"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10675 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10674 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10674"
}
]
}
CERTFR-2016-AVI-303
Vulnerability from certfr_avis - Published: 2016-09-09 - Updated: 2016-09-09
De multiples vulnérabilités ont été corrigées dans les produits Citrix. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | Citrix XenServer version 6.0 sans le correctif de sécurité XS60E063 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.39 pour solutions matérielles embarquées NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000 | ||
| Citrix | XenServer | Citrix XenServer version 6.2 SP1 sans le correctif de sécurité XS62ESP1048 | ||
| Citrix | XenServer | Citrix XenServer version 6.1 sans le correctif de sécurité XS61E073 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 4.08 pour solutions matérielles embarquées NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 Common Criteria sans le correctif de sécurité XS602ECC034 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.21 pour solutions matérielles embarquées NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000 | ||
| Citrix | XenServer | Citrix XenServer version 6.0.2 sans le correctif de sécurité XS602E057 | ||
| Citrix | XenServer | Citrix XenServer version 6.5 SP1 sans le correctif de sécurité XS65ESP1038 | ||
| Citrix | XenServer | Citrix XenServer version 7.0 sans le correctif de sécurité XS70E012 | ||
| Citrix | NetScaler | Micrologiciel LOM versions antérieures à 3.24 pour solutions matérielles embarquées NetScaler de type 22xxx et T1200 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer version 6.0 sans le correctif de s\u00e9curit\u00e9 XS60E063",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.39 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 11500/13500/14500/16500/18500/20500, 115xx, 17550/19550/20550/21550 et T1110, ainsi que CloudBridge CB4000 et CB5000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.2 SP1 sans le correctif de s\u00e9curit\u00e9 XS62ESP1048",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.1 sans le correctif de s\u00e9curit\u00e9 XS61E073",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 4.08 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 14xxx, 25xxx, T1120 et T1300",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 Common Criteria sans le correctif de s\u00e9curit\u00e9 XS602ECC034",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.21 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler MPX/SDX de type 8xxx et T1010, ainsi que CloudBridge CB2000 et CB3000",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.0.2 sans le correctif de s\u00e9curit\u00e9 XS602E057",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 6.5 SP1 sans le correctif de s\u00e9curit\u00e9 XS65ESP1038",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer version 7.0 sans le correctif de s\u00e9curit\u00e9 XS70E012",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Micrologiciel LOM versions ant\u00e9rieures \u00e0 3.24 pour solutions mat\u00e9rielles embarqu\u00e9es NetScaler de type 22xxx et T1200",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2016-7094",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7094"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2013-4434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4434"
},
{
"name": "CVE-2014-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3570"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2016-7093",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7093"
},
{
"name": "CVE-2014-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3509"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2014-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2016-7154",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7154"
},
{
"name": "CVE-2013-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3619"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2013-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3622"
},
{
"name": "CVE-2014-3511",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3511"
},
{
"name": "CVE-2014-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3568"
},
{
"name": "CVE-2016-7092",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7092"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2013-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4421"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2013-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3608"
},
{
"name": "CVE-2014-8275",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8275"
},
{
"name": "CVE-2015-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0205"
},
{
"name": "CVE-2013-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3620"
},
{
"name": "CVE-2013-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3609"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2014-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3572"
},
{
"name": "CVE-2014-3508",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3508"
},
{
"name": "CVE-2014-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3569"
},
{
"name": "CVE-2013-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3607"
},
{
"name": "CVE-2013-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3621"
},
{
"name": "CVE-2013-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3623"
}
],
"initial_release_date": "2016-09-09T00:00:00",
"last_revision_date": "2016-09-09T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-303",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-09-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Citrix\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216071 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216071"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX216642 du 08 septembre 2016",
"url": "http://support.citrix.com/article/CTX216642"
}
]
}
CERTFR-2015-AVI-185
Vulnerability from certfr_avis - Published: 2015-04-17 - Updated: 2015-04-17
De multiples vulnérabilités ont été corrigées dans IBM Security Network Intrusion Prevention System. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.6.2 | ||
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.5 | ||
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.6.1 | ||
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.4 | ||
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.3 | ||
| IBM | N/A | IBM Security Network Intrusion Prevention System version de microprogramme 4.6 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security Network Intrusion Prevention System version de microprogramme 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
}
],
"initial_release_date": "2015-04-17T00:00:00",
"last_revision_date": "2015-04-17T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-185",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIBM Security Network Intrusion Prevention System\u003c/span\u003e.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Security Network Intrusion Prevention System",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg21701326 du 15 avril 2015",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701326"
}
]
}
CERTFR-2015-AVI-416
Vulnerability from certfr_avis - Published: 2015-10-01 - Updated: 2015-10-01
De multiples vulnérabilités ont été corrigées dans Apple OS X. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple OS X versions antérieures à v10.11
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple OS X versions ant\u00e9rieures \u00e0 v10.11\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"name": "CVE-2015-5885",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5885"
},
{
"name": "CVE-2015-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5851"
},
{
"name": "CVE-2015-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5870"
},
{
"name": "CVE-2015-5873",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5873"
},
{
"name": "CVE-2015-3416",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3416"
},
{
"name": "CVE-2015-5867",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5867"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5830"
},
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2015-3415",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3415"
},
{
"name": "CVE-2015-5883",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5883"
},
{
"name": "CVE-2015-5523",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5523"
},
{
"name": "CVE-2015-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5914"
},
{
"name": "CVE-2014-9652",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9652"
},
{
"name": "CVE-2015-5875",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5875"
},
{
"name": "CVE-2015-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5860"
},
{
"name": "CVE-2015-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5824"
},
{
"name": "CVE-2015-5872",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5872"
},
{
"name": "CVE-2014-9705",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9705"
},
{
"name": "CVE-2015-5522",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5522"
},
{
"name": "CVE-2015-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5863"
},
{
"name": "CVE-2015-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1352"
},
{
"name": "CVE-2014-9427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9427"
},
{
"name": "CVE-2015-5833",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5833"
},
{
"name": "CVE-2015-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5840"
},
{
"name": "CVE-2015-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5915"
},
{
"name": "CVE-2015-5871",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5871"
},
{
"name": "CVE-2015-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2787"
},
{
"name": "CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"name": "CVE-2015-5836",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5836"
},
{
"name": "CVE-2015-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5868"
},
{
"name": "CVE-2015-5891",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5891"
},
{
"name": "CVE-2015-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5874"
},
{
"name": "CVE-2015-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2305"
},
{
"name": "CVE-2015-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5887"
},
{
"name": "CVE-2015-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5902"
},
{
"name": "CVE-2015-5900",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5900"
},
{
"name": "CVE-2015-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5858"
},
{
"name": "CVE-2015-3414",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3414"
},
{
"name": "CVE-2015-5865",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5865"
},
{
"name": "CVE-2014-9425",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9425"
},
{
"name": "CVE-2014-8611",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8611"
},
{
"name": "CVE-2015-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5879"
},
{
"name": "CVE-2015-3330",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3330"
},
{
"name": "CVE-2015-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5896"
},
{
"name": "CVE-2015-0273",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0273"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2015-5839",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5839"
},
{
"name": "CVE-2015-5893",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5893"
},
{
"name": "CVE-2015-3329",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3329"
},
{
"name": "CVE-2015-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5853"
},
{
"name": "CVE-2015-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0231"
},
{
"name": "CVE-2015-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2301"
},
{
"name": "CVE-2015-5882",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5882"
},
{
"name": "CVE-2015-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5878"
},
{
"name": "CVE-2015-5894",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5894"
},
{
"name": "CVE-2015-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5831"
},
{
"name": "CVE-2015-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5869"
},
{
"name": "CVE-2015-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1855"
},
{
"name": "CVE-2015-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5862"
},
{
"name": "CVE-2014-8147",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8147"
},
{
"name": "CVE-2015-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5889"
},
{
"name": "CVE-2015-5866",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5866"
},
{
"name": "CVE-2015-5876",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5876"
},
{
"name": "CVE-2014-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2532"
},
{
"name": "CVE-2015-5912",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5912"
},
{
"name": "CVE-2015-5877",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5877"
},
{
"name": "CVE-2015-2331",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2331"
},
{
"name": "CVE-2015-5922",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5922"
},
{
"name": "CVE-2015-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5842"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1351"
},
{
"name": "CVE-2015-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5849"
},
{
"name": "CVE-2015-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5841"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2015-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2783"
},
{
"name": "CVE-2015-3785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3785"
},
{
"name": "CVE-2015-5913",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5913"
},
{
"name": "CVE-2014-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3618"
},
{
"name": "CVE-2015-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5899"
},
{
"name": "CVE-2015-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5847"
},
{
"name": "CVE-2015-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0235"
},
{
"name": "CVE-2015-5903",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5903"
},
{
"name": "CVE-2015-5864",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5864"
},
{
"name": "CVE-2015-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5917"
},
{
"name": "CVE-2015-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0232"
},
{
"name": "CVE-2015-5901",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5901"
},
{
"name": "CVE-2015-5854",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5854"
},
{
"name": "CVE-2015-5881",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5881"
},
{
"name": "CVE-2015-5897",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5897"
},
{
"name": "CVE-2015-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5888"
},
{
"name": "CVE-2015-5890",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5890"
},
{
"name": "CVE-2015-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5884"
},
{
"name": "CVE-2013-3951",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3951"
},
{
"name": "CVE-2014-9709",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9709"
},
{
"name": "CVE-2015-5855",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5855"
},
{
"name": "CVE-2015-2348",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2348"
},
{
"name": "CVE-2014-8146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8146"
}
],
"initial_release_date": "2015-10-01T00:00:00",
"last_revision_date": "2015-10-01T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-416",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT205267 du 30 septembre 2015",
"url": "https://support.apple.com/en-us/HT205267"
}
]
}
CERTFR-2015-AVI-117
Vulnerability from certfr_avis - Published: 2015-03-19 - Updated: 2015-03-19
De multiples vulnérabilités ont été corrigées dans OpenSSL. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions 0.9.8, 1.0.0, 1.0.1, et 1.0.2
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions 0.9.8, 1.0.0, 1.0.1, et 1.0.2\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
}
],
"initial_release_date": "2015-03-19T00:00:00",
"last_revision_date": "2015-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-117",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOpenSSL\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL du 19 mars 2015",
"url": "https://openssl.org/news/secadv_20150319.txt"
}
]
}
CERTFR-2015-AVI-393
Vulnerability from certfr_avis - Published: 2015-09-18 - Updated: 2015-09-18
De multiples vulnérabilités ont été corrigées dans Apple iOS. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple iOS versions antérieures à 9
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple iOS versions ant\u00e9rieures \u00e0 9\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5817",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5817"
},
{
"name": "CVE-2015-5880",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5880"
},
{
"name": "CVE-2015-5844",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5844"
},
{
"name": "CVE-2015-5793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5793"
},
{
"name": "CVE-2015-5885",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5885"
},
{
"name": "CVE-2015-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5851"
},
{
"name": "CVE-2015-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5906"
},
{
"name": "CVE-2015-5816",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5816"
},
{
"name": "CVE-2015-5797",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5797"
},
{
"name": "CVE-2015-5867",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5867"
},
{
"name": "CVE-2015-5792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5792"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-5523",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5523"
},
{
"name": "CVE-2015-5767",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5767"
},
{
"name": "CVE-2015-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5860"
},
{
"name": "CVE-2015-5788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5788"
},
{
"name": "CVE-2015-5824",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5824"
},
{
"name": "CVE-2015-5522",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5522"
},
{
"name": "CVE-2015-5892",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5892"
},
{
"name": "CVE-2015-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5863"
},
{
"name": "CVE-2015-5822",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5822"
},
{
"name": "CVE-2015-5840",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5840"
},
{
"name": "CVE-2015-5845",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5845"
},
{
"name": "CVE-2015-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5868"
},
{
"name": "CVE-2015-5861",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5861"
},
{
"name": "CVE-2015-5835",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5835"
},
{
"name": "CVE-2015-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5874"
},
{
"name": "CVE-2015-5789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5789"
},
{
"name": "CVE-2015-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5748"
},
{
"name": "CVE-2015-1129",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1129"
},
{
"name": "CVE-2015-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5850"
},
{
"name": "CVE-2015-5904",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5904"
},
{
"name": "CVE-2015-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5858"
},
{
"name": "CVE-2015-5843",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5843"
},
{
"name": "CVE-2015-5806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5806"
},
{
"name": "CVE-2015-5895",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5895"
},
{
"name": "CVE-2015-5805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5805"
},
{
"name": "CVE-2015-5827",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5827"
},
{
"name": "CVE-2014-8611",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8611"
},
{
"name": "CVE-2015-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5879"
},
{
"name": "CVE-2015-5765",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5765"
},
{
"name": "CVE-2015-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5896"
},
{
"name": "CVE-2015-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5764"
},
{
"name": "CVE-2015-5811",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5811"
},
{
"name": "CVE-2015-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5829"
},
{
"name": "CVE-2015-5839",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5839"
},
{
"name": "CVE-2015-5834",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5834"
},
{
"name": "CVE-2015-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1205"
},
{
"name": "CVE-2015-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5898"
},
{
"name": "CVE-2015-5819",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5819"
},
{
"name": "CVE-2015-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5905"
},
{
"name": "CVE-2015-5856",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5856"
},
{
"name": "CVE-2015-5882",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5882"
},
{
"name": "CVE-2015-5921",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5921"
},
{
"name": "CVE-2015-5810",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5810"
},
{
"name": "CVE-2015-5804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5804"
},
{
"name": "CVE-2015-5831",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5831"
},
{
"name": "CVE-2015-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5869"
},
{
"name": "CVE-2015-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5862"
},
{
"name": "CVE-2015-5818",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5818"
},
{
"name": "CVE-2015-5807",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5807"
},
{
"name": "CVE-2015-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5802"
},
{
"name": "CVE-2015-5876",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5876"
},
{
"name": "CVE-2015-5912",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5912"
},
{
"name": "CVE-2015-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5814"
},
{
"name": "CVE-2015-5842",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5842"
},
{
"name": "CVE-2015-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5803"
},
{
"name": "CVE-2015-5812",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5812"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-5857",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5857"
},
{
"name": "CVE-2015-5791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5791"
},
{
"name": "CVE-2015-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5825"
},
{
"name": "CVE-2015-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5841"
},
{
"name": "CVE-2015-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5846"
},
{
"name": "CVE-2015-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5823"
},
{
"name": "CVE-2015-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5916"
},
{
"name": "CVE-2015-5838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5838"
},
{
"name": "CVE-2015-5826",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5826"
},
{
"name": "CVE-2015-5801",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5801"
},
{
"name": "CVE-2015-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5899"
},
{
"name": "CVE-2015-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5847"
},
{
"name": "CVE-2015-5800",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5800"
},
{
"name": "CVE-2015-5813",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5813"
},
{
"name": "CVE-2015-5795",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5795"
},
{
"name": "CVE-2015-5903",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5903"
},
{
"name": "CVE-2015-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5848"
},
{
"name": "CVE-2015-5799",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5799"
},
{
"name": "CVE-2015-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5794"
},
{
"name": "CVE-2015-5820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5820"
},
{
"name": "CVE-2015-5790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5790"
},
{
"name": "CVE-2015-5809",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5809"
},
{
"name": "CVE-2015-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5907"
},
{
"name": "CVE-2015-5832",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5832"
},
{
"name": "CVE-2015-5837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5837"
},
{
"name": "CVE-2013-3951",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3951"
},
{
"name": "CVE-2015-5796",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5796"
},
{
"name": "CVE-2015-5855",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5855"
},
{
"name": "CVE-2015-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3801"
},
{
"name": "CVE-2015-5821",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5821"
},
{
"name": "CVE-2014-8146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8146"
}
],
"initial_release_date": "2015-09-18T00:00:00",
"last_revision_date": "2015-09-18T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-393",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-09-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple iOS\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT205212 du 16 septembre 2015",
"url": "https://support.apple.com/fr-fr/HT205212"
}
]
}
CERTFR-2022-AVI-1094
Vulnerability from certfr_avis - Published: 2022-12-13 - Updated: 2022-12-13
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) versions antérieures à V3.0.1 | ||
| Siemens | N/A | SIPROTEC 5, pour plus d'informations, veuillez-vous référer aux avis éditeur : https://cert-portal.siemens.com/productcert/html/ssa-552874.html et https://cert-portal.siemens.com/productcert/html/ssa-223771.html | ||
| Siemens | N/A | Teamcenter Visualization V13.2.x antérieures à V13.2.0.12 | ||
| Siemens | N/A | TALON TC Series (BACnet) versions antérieures à V3.5.5 | ||
| Siemens | N/A | SICAM PAS/PQS versions 8.x antérieures à 8.06 | ||
| Siemens | N/A | Parasolid versions V35.0.x antérieures à V35.0.170 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional V15 versions antérieures à V15.1 Update 5 | ||
| Siemens | N/A | PLM Help Server V4.2 toutes versions | ||
| Siemens | N/A | SICAM PAS/PQS versions antérieures à 7.0 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SINUMERIK Operate versions antérieures à V6.14 | ||
| Siemens | N/A | SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions | ||
| Siemens | N/A | Polarion ALM toutes versions | ||
| Siemens | N/A | APOGEE PXC Series (P2 Ethernet) versions antérieures à V2.8.20 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) V13 versions antérieures à V13 SP2 Update 4 | ||
| Siemens | N/A | Mendix Email Connector versions antérieures à 2.0.0 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional V16 versions antérieures à V16 Update 2 | ||
| Siemens | N/A | JT2Go toutes versions | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SIMATIC NET PC Software V14 versions antérieures à V14 SP1 Update 14 | ||
| Siemens | N/A | APOGEE PXC Series (BACnet) versions antérieures à V3.5.5 | ||
| Siemens | N/A | SCALANCE X-200RNA toutes versions | ||
| Siemens | N/A | SINAMICS STARTER versions antérieures à V5.4 HF2 | ||
| Siemens | N/A | Simcenter STAR-CCM+ toutes versions | ||
| Siemens | N/A | SIMATIC Automation Tool versions antérieures à V4 SP2 | ||
| Siemens | N/A | SIMATIC PCS neo versions antérieures à V3.0 SP1 | ||
| Siemens | N/A | Parasolid versions V33.1.x antérieures à V33.1.264 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à V5.6 SP2 HF3 | ||
| Siemens | N/A | SIMATIC WinCC OA versions V3.18.x antérieures à V3.18 P014 | ||
| Siemens | N/A | SIMATIC WinCC OA V3.17 versions antérieures à V3.17 P003 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à V7.5 SP1 Update 3 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) V14 versions antérieures à V14 SP1 Update 10 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional V14 versions antérieures à V14 SP1 Update 10 | ||
| Siemens | N/A | SINEC NMS versions antérieures à V1.0 SP2 | ||
| Siemens | N/A | Parasolid versions V34.1.x antérieures à V34.1.242 | ||
| Siemens | N/A | SIMATIC Drive Controller family versions antérieures à V3.0.1 | ||
| Siemens | N/A | Teamcenter Visualization V13.3.x | ||
| Siemens | N/A | Parasolid versions V34.0.x antérieures à V34.0.252 | ||
| Siemens | N/A | SCALANCE, pour plus d'informations, veuillez-vous référer aux avis éditeur : https://cert-portal.siemens.com/productcert/html/ssa-413565.html, https://cert-portal.siemens.com/productcert/html/ssa-333517.html, https://cert-portal.siemens.com/productcert/html/ssa-363821.html et https://cert-portal.siemens.com/productcert/html/ssa-412672.html | ||
| Siemens | N/A | Teamcenter Visualization V14.1.x antérieures à V14.1.0.6 | ||
| Siemens | N/A | Mcenter versions supérieures ou égales à V5.2.1.0 | ||
| Siemens | N/A | SINEMA Server versions antérieures à V14 SP3 | ||
| Siemens | N/A | SIMATIC WinCC OA versions V3.17.x antérieures à V3.17 P024 | ||
| Siemens | N/A | SIMATIC WinCC OA versions V3.15.x | ||
| Siemens | N/A | TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced versions antérieures à V5.0 | ||
| Siemens | N/A | SIMATIC RTLS Locating Manager (6GT2780-0DA00) versions supérieures ou égales à V2.13 | ||
| Siemens | N/A | RUGGEDCOM, pour plus d'informations, veuillez-vous référer à l'avis éditeur : https://cert-portal.siemens.com/productcert/html/ssa-413565.html | ||
| Siemens | N/A | SICAM GridPass (6MD7711-2AA00-1EA0) versions supérieures ou égales à V1.80 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) V15 versions antérieures à V15.1 Update 5 | ||
| Siemens | N/A | Teamcenter Visualization V14.0.x | ||
| Siemens | N/A | SIMATIC WinCC OA versions V3.16.x antérieures à V3.16 P035 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Advanced versions antérieures à V16 Update 2 | ||
| Siemens | N/A | SIMATIC WinCC V7.4 versions antérieures à V7.4 SP1 Update 14 | ||
| Siemens | N/A | SIMATIC WinCC Runtime Professional V13 versions antérieures à V13 SP2 Update 4 | ||
| Siemens | N/A | SIMATIC NET PC Software V16 versions antérieures à V16 Upd3 | ||
| Siemens | N/A | SIMATIC ProSave versions antérieures à V17 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller versions antérieures à V21.8 | ||
| Siemens | N/A | Mendix Workflow Commons versions antérieures à 2.4.0 | ||
| Siemens | N/A | SINAMICS Startdrive versions antérieures à V16 Update 3 | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) V16 versions antérieures à V16 Update 2 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU family (incl. SIPLUS variants) versions antérieures à V4.6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller toutes versions | ||
| Siemens | N/A | SIMATIC WinCC OA V3.16 versions antérieures à V3.16 P018 | ||
| Siemens | N/A | Calibre ICE versions supérieures ou égales à V2022.4 | ||
| Siemens | N/A | SINUMERIK ONE virtual versions antérieures à V6.14 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5, pour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteur : https://cert-portal.siemens.com/productcert/html/ssa-552874.html et https://cert-portal.siemens.com/productcert/html/ssa-223771.html",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization V13.2.x ant\u00e9rieures \u00e0 V13.2.0.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TALON TC Series (BACnet) versions ant\u00e9rieures \u00e0 V3.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM PAS/PQS versions 8.x ant\u00e9rieures \u00e0 8.06",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions V35.0.x ant\u00e9rieures \u00e0 V35.0.170",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional V15 versions ant\u00e9rieures \u00e0 V15.1 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PLM Help Server V4.2 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM PAS/PQS versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK Operate versions ant\u00e9rieures \u00e0 V6.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Polarion ALM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "APOGEE PXC Series (P2 Ethernet) versions ant\u00e9rieures \u00e0 V2.8.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) V13 versions ant\u00e9rieures \u00e0 V13 SP2 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix Email Connector versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional V16 versions ant\u00e9rieures \u00e0 V16 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 versions ant\u00e9rieures \u00e0 V14 SP1 Update 14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "APOGEE PXC Series (BACnet) versions ant\u00e9rieures \u00e0 V3.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200RNA toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS STARTER versions ant\u00e9rieures \u00e0 V5.4 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter STAR-CCM+ toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Automation Tool versions ant\u00e9rieures \u00e0 V4 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V3.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions V33.1.x ant\u00e9rieures \u00e0 V33.1.264",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 V5.6 SP2 HF3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions V3.18.x ant\u00e9rieures \u00e0 V3.18 P014",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.17 versions ant\u00e9rieures \u00e0 V3.17 P003",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 SP1 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) V14 versions ant\u00e9rieures \u00e0 V14 SP1 Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional V14 versions ant\u00e9rieures \u00e0 V14 SP1 Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS versions ant\u00e9rieures \u00e0 V1.0 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions V34.1.x ant\u00e9rieures \u00e0 V34.1.242",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller family versions ant\u00e9rieures \u00e0 V3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization V13.3.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid versions V34.0.x ant\u00e9rieures \u00e0 V34.0.252",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE, pour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteur : https://cert-portal.siemens.com/productcert/html/ssa-413565.html, https://cert-portal.siemens.com/productcert/html/ssa-333517.html, https://cert-portal.siemens.com/productcert/html/ssa-363821.html et https://cert-portal.siemens.com/productcert/html/ssa-412672.html",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization V14.1.x ant\u00e9rieures \u00e0 V14.1.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mcenter versions sup\u00e9rieures ou \u00e9gales \u00e0 V5.2.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server versions ant\u00e9rieures \u00e0 V14 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions V3.17.x ant\u00e9rieures \u00e0 V3.17 P024",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions V3.15.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RTLS Locating Manager (6GT2780-0DA00) versions sup\u00e9rieures ou \u00e9gales \u00e0 V2.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM, pour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer \u00e0 l\u0027avis \u00e9diteur : https://cert-portal.siemens.com/productcert/html/ssa-413565.html",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM GridPass (6MD7711-2AA00-1EA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V1.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) V15 versions ant\u00e9rieures \u00e0 V15.1 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization V14.0.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions V3.16.x ant\u00e9rieures \u00e0 V3.16 P035",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Advanced versions ant\u00e9rieures \u00e0 V16 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.4 versions ant\u00e9rieures \u00e0 V7.4 SP1 Update 14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Runtime Professional V13 versions ant\u00e9rieures \u00e0 V13 SP2 Update 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V16 versions ant\u00e9rieures \u00e0 V16 Upd3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ProSave versions ant\u00e9rieures \u00e0 V17",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller versions ant\u00e9rieures \u00e0 V21.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix Workflow Commons versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS Startdrive versions ant\u00e9rieures \u00e0 V16 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 (TIA Portal) V16 versions ant\u00e9rieures \u00e0 V16 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V4.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA V3.16 versions ant\u00e9rieures \u00e0 V3.16 P018",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Calibre ICE versions sup\u00e9rieures ou \u00e9gales \u00e0 V2022.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK ONE virtual versions ant\u00e9rieures \u00e0 V6.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-46345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46345"
},
{
"name": "CVE-2020-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28388"
},
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2016-0703",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0703"
},
{
"name": "CVE-2021-40365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40365"
},
{
"name": "CVE-2022-41279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41279"
},
{
"name": "CVE-2022-46353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46353"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2019-6110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6110"
},
{
"name": "CVE-2022-46352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46352"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2022-46347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46347"
},
{
"name": "CVE-2022-46349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46349"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-6563",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6563"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2022-46351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46351"
},
{
"name": "CVE-2015-6564",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6564"
},
{
"name": "CVE-2015-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3195"
},
{
"name": "CVE-2016-0777",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0777"
},
{
"name": "CVE-2003-1562",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1562"
},
{
"name": "CVE-2016-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0800"
},
{
"name": "CVE-2016-2105",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2105"
},
{
"name": "CVE-2016-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2177"
},
{
"name": "CVE-2022-41280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41280"
},
{
"name": "CVE-2016-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2176"
},
{
"name": "CVE-2019-6109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
},
{
"name": "CVE-2022-46346",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46346"
},
{
"name": "CVE-2022-41283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41283"
},
{
"name": "CVE-2022-46144",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46144"
},
{
"name": "CVE-2016-6302",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6302"
},
{
"name": "CVE-2022-45044",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45044"
},
{
"name": "CVE-2018-4842",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4842"
},
{
"name": "CVE-2022-44731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44731"
},
{
"name": "CVE-2022-46355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46355"
},
{
"name": "CVE-2016-6303",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6303"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2022-41288",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41288"
},
{
"name": "CVE-2019-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1552"
},
{
"name": "CVE-2016-1907",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1907"
},
{
"name": "CVE-2016-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2178"
},
{
"name": "CVE-2022-43517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43517"
},
{
"name": "CVE-2016-10011",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10011"
},
{
"name": "CVE-2015-6565",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6565"
},
{
"name": "CVE-2022-3160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3160"
},
{
"name": "CVE-2016-6307",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6307"
},
{
"name": "CVE-2016-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2179"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2022-41282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41282"
},
{
"name": "CVE-2015-3194",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3194"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2022-46350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46350"
},
{
"name": "CVE-2022-46142",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46142"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2016-6304",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6304"
},
{
"name": "CVE-2022-46348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46348"
},
{
"name": "CVE-2022-46140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46140"
},
{
"name": "CVE-2016-1908",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1908"
},
{
"name": "CVE-2016-2107",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2107"
},
{
"name": "CVE-2019-16905",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16905"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2016-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2181"
},
{
"name": "CVE-2019-6111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6111"
},
{
"name": "CVE-2016-8858",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
},
{
"name": "CVE-2016-6515",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6515"
},
{
"name": "CVE-2015-3197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3197"
},
{
"name": "CVE-2022-41281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41281"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2016-2106",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2106"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2020-7580",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7580"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2016-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0799"
},
{
"name": "CVE-2015-1794",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1794"
},
{
"name": "CVE-2022-34821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34821"
},
{
"name": "CVE-2016-6308",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6308"
},
{
"name": "CVE-2021-44694",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44694"
},
{
"name": "CVE-2016-6306",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6306"
},
{
"name": "CVE-2017-15906",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15906"
},
{
"name": "CVE-2021-44695",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44695"
},
{
"name": "CVE-2022-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3161"
},
{
"name": "CVE-2016-10010",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10010"
},
{
"name": "CVE-2022-45936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45936"
},
{
"name": "CVE-2022-46265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46265"
},
{
"name": "CVE-2016-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0704"
},
{
"name": "CVE-2016-0702",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0702"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2014-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8176"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2015-3193",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3193"
},
{
"name": "CVE-2022-43723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43723"
},
{
"name": "CVE-2018-15473",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15473"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2022-45484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45484"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2003-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0190"
},
{
"name": "CVE-2018-20685",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20685"
},
{
"name": "CVE-2016-6305",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6305"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2016-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0798"
},
{
"name": "CVE-2022-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46143"
},
{
"name": "CVE-2022-41286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41286"
},
{
"name": "CVE-2016-10012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10012"
},
{
"name": "CVE-2022-41278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41278"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2015-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8325"
},
{
"name": "CVE-2022-41287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41287"
},
{
"name": "CVE-2022-45937",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45937"
},
{
"name": "CVE-2022-46354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46354"
},
{
"name": "CVE-2022-43724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43724"
},
{
"name": "CVE-2022-43722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43722"
},
{
"name": "CVE-2016-6210",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6210"
},
{
"name": "CVE-2015-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3196"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2022-41284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41284"
},
{
"name": "CVE-2016-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2842"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2016-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2180"
},
{
"name": "CVE-2021-44693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44693"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2016-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2182"
},
{
"name": "CVE-2016-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0797"
},
{
"name": "CVE-2015-6574",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6574"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2016-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0705"
},
{
"name": "CVE-2019-13924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13924"
},
{
"name": "CVE-2016-2109",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2109"
},
{
"name": "CVE-2016-2108",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2108"
},
{
"name": "CVE-2022-44575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44575"
},
{
"name": "CVE-2022-41285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41285"
},
{
"name": "CVE-2022-46664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46664"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3159"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2016-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0778"
},
{
"name": "CVE-2018-4848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4848"
}
],
"initial_release_date": "2022-12-13T00:00:00",
"last_revision_date": "2022-12-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-1094",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2022-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-180579.html"
}
]
}
CERTFR-2015-AVI-169
Vulnerability from certfr_avis - Published: 2015-04-15 - Updated: 2015-04-15
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris versions 11.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2188"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
},
{
"name": "CVE-2014-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0339"
},
{
"name": "CVE-2015-0255",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0255"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-2190",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2190"
},
{
"name": "CVE-2014-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3884"
},
{
"name": "CVE-2014-9623",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9623"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2014-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3924"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2014-3886",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3886"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2189"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2014-5353",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5353"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-169",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 14 avril 2015",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}
]
}
CNVD-2015-01892
Vulnerability from cnvd - Published: 2015-03-23用户可参考如下供应商提供的安全公告获得补丁信息: https://openssl.org/news/secadv_20150319.txt https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f
| Name | ['OpenSSL OpenSSL < 1.0.0r', 'OpenSSL OpenSSL < 1.0.2a', 'OpenSSL OpenSSL < 0.9.8zf', 'OpenSSL OpenSSL < 1.0.1m'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "73227"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-0287"
}
},
"description": "OpenSSL\u662f\u4e00\u79cd\u5f00\u653e\u6e90\u7801\u7684SSL\u5b9e\u73b0\uff0c\u7528\u6765\u5b9e\u73b0\u7f51\u7edc\u901a\u4fe1\u7684\u9ad8\u5f3a\u5ea6\u52a0\u5bc6\uff0c\u73b0\u5728\u88ab\u5e7f\u6cdb\u5730\u7528\u4e8e\u5404\u79cd\u7f51\u7edc\u5e94\u7528\u7a0b\u5e8f\u4e2d\u3002\r\n\r\nOpenSSL \u0027crypto/asn1/tasn_dec.c\u0027\u7684\u0027ASN1_item_ex_d2i\u0027\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u80fd\u91cd\u65b0\u521d\u59cb\u5316CHOICE\u53caADB\u6570\u636e\u7ed3\u6784\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u6784\u9020\u7684\u5e94\u7528\uff0c\u53ef\u5bfc\u81f4\u65e0\u6548\u5199\u64cd\u4f5c\u3001\u5185\u5b58\u7834\u574f\u53ca\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "Emilia K\u0026#195;\u00a4sper",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://openssl.org/news/secadv_20150319.txt\r\nhttps://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-01892",
"openTime": "2015-03-23",
"patchDescription": "OpenSSL\u662f\u4e00\u79cd\u5f00\u653e\u6e90\u7801\u7684SSL\u5b9e\u73b0\uff0c\u7528\u6765\u5b9e\u73b0\u7f51\u7edc\u901a\u4fe1\u7684\u9ad8\u5f3a\u5ea6\u52a0\u5bc6\uff0c\u73b0\u5728\u88ab\u5e7f\u6cdb\u5730\u7528\u4e8e\u5404\u79cd\u7f51\u7edc\u5e94\u7528\u7a0b\u5e8f\u4e2d\u3002 \r\n\r\nOpenSSL \u0027crypto/asn1/tasn_dec.c\u0027\u7684\u0027ASN1_item_ex_d2i\u0027\u51fd\u6570\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u80fd\u91cd\u65b0\u521d\u59cb\u5316CHOICE\u53caADB\u6570\u636e\u7ed3\u6784\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u6784\u9020\u7684\u5e94\u7528\uff0c\u53ef\u5bfc\u81f4\u65e0\u6548\u5199\u64cd\u4f5c\u3001\u5185\u5b58\u7834\u574f\u53ca\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenSSL \u0027ASN1_item_ex_d2i\u0027\u51fd\u6570\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"OpenSSL OpenSSL \u003c 1.0.0r",
"OpenSSL OpenSSL \u003c 1.0.2a",
"OpenSSL OpenSSL \u003c 0.9.8zf",
"OpenSSL OpenSSL \u003c 1.0.1m"
]
},
"referenceLink": "https://openssl.org/news/secadv_20150319.txt",
"serverity": "\u4e2d",
"submitTime": "2015-03-20",
"title": "OpenSSL \u0027ASN1_item_ex_d2i\u0027\u51fd\u6570\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
GHSA-7MXG-8JV7-CJ7V
Vulnerability from github – Published: 2022-05-17 00:24 – Updated: 2025-04-12 12:46The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
{
"affected": [],
"aliases": [
"CVE-2015-0287"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-03-19T22:59:00Z",
"severity": "MODERATE"
},
"details": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.",
"id": "GHSA-7mxg-8jv7-cj7v",
"modified": "2025-04-12T12:46:20Z",
"published": "2022-05-17T00:24:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287"
},
{
"type": "WEB",
"url": "https://access.redhat.com/articles/1384453"
},
{
"type": "WEB",
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
},
{
"type": "WEB",
"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"type": "WEB",
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"type": "WEB",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT205212"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT205267"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"type": "WEB",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"type": "WEB",
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT204942"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/73227"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1031929"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2537-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2015-0287
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2015-0287",
"description": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.",
"id": "GSD-2015-0287",
"references": [
"https://www.suse.com/security/cve/CVE-2015-0287.html",
"https://www.debian.org/security/2015/dsa-3197",
"https://access.redhat.com/errata/RHSA-2015:0800",
"https://access.redhat.com/errata/RHSA-2015:0752",
"https://access.redhat.com/errata/RHSA-2015:0716",
"https://access.redhat.com/errata/RHSA-2015:0715",
"https://ubuntu.com/security/CVE-2015-0287",
"https://advisories.mageia.org/CVE-2015-0287.html",
"https://alas.aws.amazon.com/cve/html/CVE-2015-0287.html",
"https://linux.oracle.com/cve/CVE-2015-0287.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-0287"
],
"details": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.",
"id": "GSD-2015-0287",
"modified": "2023-12-13T01:19:58.780412Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-0287",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "RHSA-2015:0715",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"name": "openSUSE-SU-2015:0554",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"name": "DSA-3197",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"name": "USN-2537-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"name": "HPSBMU03409",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"name": "FEDORA-2015-4303",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa92",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"name": "https://www.openssl.org/news/secadv_20150319.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"name": "https://support.apple.com/HT205212",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205212"
},
{
"name": "73227",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73227"
},
{
"name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "HPSBMU03380",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "FEDORA-2015-4300",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "FEDORA-2015-6951",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"name": "openSUSE-SU-2016:0640",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name": "https://access.redhat.com/articles/1384453",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/articles/1384453"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "openSUSE-SU-2015:1277",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
},
{
"name": "HPSBUX03334",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "MDVSA-2015:063",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"name": "SUSE-SU-2015:0541",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "RHSA-2015:0716",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"name": "HPSBGN03306",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT204942"
},
{
"name": "SUSE-SU-2015:0578",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"name": "FreeBSD-SA-15:06",
"refsource": "FREEBSD",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"name": "HPSBMU03397",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "RHSA-2015:0752",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"name": "RHSA-2015:0800",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"name": "1031929",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031929"
},
{
"name": "SSRT102000",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "APPLE-SA-2015-09-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name": "MDVSA-2015:062",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name": "FEDORA-2015-4320",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX216642"
},
{
"name": "SUSE-SU-2016:0678",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name": "FEDORA-2015-6855",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"name": "GLSA-201503-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.9.8ze",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-0287"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-17"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.openssl.org/news/secadv_20150319.txt",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.openssl.org/news/secadv_20150319.txt"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380"
},
{
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f",
"refsource": "CONFIRM",
"tags": [],
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=b717b083073b6cacc0a5e2397b661678aff7ae7f"
},
{
"name": "FEDORA-2015-4300",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html"
},
{
"name": "FEDORA-2015-4303",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html"
},
{
"name": "FEDORA-2015-4320",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html"
},
{
"name": "DSA-3197",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3197"
},
{
"name": "openSUSE-SU-2015:0554",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html"
},
{
"name": "FreeBSD-SA-15:06",
"refsource": "FREEBSD",
"tags": [],
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc"
},
{
"name": "SUSE-SU-2015:0541",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html"
},
{
"name": "USN-2537-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2537-1"
},
{
"name": "1031929",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1031929"
},
{
"name": "SUSE-SU-2015:0578",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
},
{
"name": "RHSA-2015:0716",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html"
},
{
"name": "MDVSA-2015:063",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063"
},
{
"name": "MDVSA-2015:062",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
},
{
"name": "RHSA-2015:0752",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html"
},
{
"name": "RHSA-2015:0715",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html"
},
{
"name": "HPSBGN03306",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=142841429220765\u0026w=2"
},
{
"name": "RHSA-2015:0800",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html"
},
{
"name": "https://access.redhat.com/articles/1384453",
"refsource": "CONFIRM",
"tags": [],
"url": "https://access.redhat.com/articles/1384453"
},
{
"name": "FEDORA-2015-6951",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html"
},
{
"name": "FEDORA-2015-6855",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html"
},
{
"name": "APPLE-SA-2015-06-30-2",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"
},
{
"name": "http://support.apple.com/kb/HT204942",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT204942"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "https://support.apple.com/HT205212",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.apple.com/HT205212"
},
{
"name": "APPLE-SA-2015-09-16-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.apple.com/HT205267"
},
{
"name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa92",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bto.bluecoat.com/security-advisory/sa92"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "HPSBMU03397",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=144050297101809\u0026w=2"
},
{
"name": "SSRT102000",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=143213830203296\u0026w=2"
},
{
"name": "HPSBMU03380",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=143748090628601\u0026w=2"
},
{
"name": "HPSBMU03409",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"name": "SUSE-SU-2016:0678",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name": "openSUSE-SU-2016:0640",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name": "GLSA-201503-11",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201503-11"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"name": "openSUSE-SU-2015:1277",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110",
"refsource": "CONFIRM",
"tags": [],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10110"
},
{
"name": "73227",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/73227"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "https://support.citrix.com/article/CTX216642",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.citrix.com/article/CTX216642"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-12-13T12:15Z",
"publishedDate": "2015-03-19T22:59Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.