mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
4.6 KiB
JSON
138 lines
4.6 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2013-5607",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "[dev-tech-nspr] 20131113 [ANNOUNCE] NSPR 4.10.2 Release",
|
|
"refsource" : "MLIST",
|
|
"url" : "https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/_8AcygMEjSA/mm_cqQzLPFQJ"
|
|
},
|
|
{
|
|
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=927687",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=927687"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
|
},
|
|
{
|
|
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
|
|
},
|
|
{
|
|
"name" : "DSA-2820",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2013/dsa-2820"
|
|
},
|
|
{
|
|
"name" : "GLSA-201406-19",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-201406-19.xml"
|
|
},
|
|
{
|
|
"name" : "GLSA-201504-01",
|
|
"refsource" : "GENTOO",
|
|
"url" : "https://security.gentoo.org/glsa/201504-01"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1791",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1791.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1829",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1829.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2013:1807",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:1732",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html"
|
|
},
|
|
{
|
|
"name" : "USN-2031-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/USN-2031-1"
|
|
},
|
|
{
|
|
"name" : "USN-2032-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/USN-2032-1"
|
|
},
|
|
{
|
|
"name" : "USN-2087-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/USN-2087-1"
|
|
},
|
|
{
|
|
"name" : "63802",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/63802"
|
|
}
|
|
]
|
|
}
|
|
}
|