From f8bcbb4b3a7164be533b707a7d32ad3781dbe97e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 8 Aug 2018 11:03:17 -0400 Subject: [PATCH] - Synchronized data. --- 2018/11xxx/CVE-2018-11769.json | 2 ++ 2018/14xxx/CVE-2018-14373.json | 53 ++-------------------------------- 2018/14xxx/CVE-2018-14374.json | 53 ++-------------------------------- 2018/14xxx/CVE-2018-14375.json | 53 ++-------------------------------- 2018/14xxx/CVE-2018-14378.json | 53 ++-------------------------------- 5 files changed, 10 insertions(+), 204 deletions(-) diff --git a/2018/11xxx/CVE-2018-11769.json b/2018/11xxx/CVE-2018-11769.json index 6199c1c48fb..cf37f5cca56 100644 --- a/2018/11xxx/CVE-2018-11769.json +++ b/2018/11xxx/CVE-2018-11769.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://lists.apache.org/thread.html/1052ad7a1b32b9756df4f7860f5cb5a96b739f444117325a19a4bf75@%3Cdev.couchdb.apache.org%3E", + "refsource" : "MISC", "url" : "https://lists.apache.org/thread.html/1052ad7a1b32b9756df4f7860f5cb5a96b739f444117325a19a4bf75@%3Cdev.couchdb.apache.org%3E" } ] diff --git a/2018/14xxx/CVE-2018-14373.json b/2018/14xxx/CVE-2018-14373.json index 6c586d3637c..4457ba35cf6 100644 --- a/2018/14xxx/CVE-2018-14373.json +++ b/2018/14xxx/CVE-2018-14373.json @@ -2,30 +2,7 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-14373", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } + "STATE" : "REJECT" }, "data_format" : "MITRE", "data_type" : "CVE", @@ -34,33 +11,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "An issue was discovered in LibTIFF 4.0.9. In TIFFFindField in tif_dirinfo.c, the structure tif is being dereferenced without first checking that the structure is not empty and has the requested fields (tif_foundfield). In the call sequences following from the affected library functions (TIFFVGetField, TIFFVGetFieldDefaulted, TIFFVStripSize, TIFFScanlineSize, TIFFTileSize, TIFFGetFieldDefaulted, and TIFFGetField), this sanitization of the tif structure is never being done and, hence, using them with an invalid or empty tif structure will trigger a buffer overflow, leading to a crash." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2801", - "refsource" : "MISC", - "url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2801" - }, - { - "name" : "104912", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/104912" + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2018/14xxx/CVE-2018-14374.json b/2018/14xxx/CVE-2018-14374.json index dedadb53af4..2e7fa33afd4 100644 --- a/2018/14xxx/CVE-2018-14374.json +++ b/2018/14xxx/CVE-2018-14374.json @@ -2,30 +2,7 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-14374", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } + "STATE" : "REJECT" }, "data_format" : "MITRE", "data_type" : "CVE", @@ -34,33 +11,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an empty fmt argument to unixErrorHandler in tif_unix.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFClientOpen, TIFFFdOpen, TIFFRawStripSize, TIFFCheckTile, TIFFComputeStrip, TIFFReadRawTile, TIFFUnRegisterCODEC, and TIFFWriteEncodedTile." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2802", - "refsource" : "MISC", - "url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2802" - }, - { - "name" : "104912", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/104912" + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2018/14xxx/CVE-2018-14375.json b/2018/14xxx/CVE-2018-14375.json index a0372370afd..70ee295e53c 100644 --- a/2018/14xxx/CVE-2018-14375.json +++ b/2018/14xxx/CVE-2018-14375.json @@ -2,30 +2,7 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-14375", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } + "STATE" : "REJECT" }, "data_format" : "MITRE", "data_type" : "CVE", @@ -34,33 +11,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "An issue was discovered in LibTIFF 4.0.9. A buffer overflow vulnerability can occur via an invalid or empty tif argument to TIFFRGBAImageOK in tif_getimage.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFReadRGBAImage, TIFFRGBAImageOK, and TIFFRGBAImageBegin." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2803", - "refsource" : "MISC", - "url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2803" - }, - { - "name" : "104912", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/104912" + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2018/14xxx/CVE-2018-14378.json b/2018/14xxx/CVE-2018-14378.json index 6489274fd68..e63bd79e8ee 100644 --- a/2018/14xxx/CVE-2018-14378.json +++ b/2018/14xxx/CVE-2018-14378.json @@ -2,30 +2,7 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-14378", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } + "STATE" : "REJECT" }, "data_format" : "MITRE", "data_type" : "CVE", @@ -34,33 +11,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an invalid or empty tif argument to TIFFWriteBufferSetup in tif_write.c, and it can be exploited (at a minimum) via the following high-level library API function: TIFFWriteTile." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2806", - "refsource" : "MISC", - "url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2806" - }, - { - "name" : "104912", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/104912" + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] }