2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-0797" ,
"sourceIdentifier" : "security@mozilla.org" ,
"published" : "2015-05-14T10:59:00.070" ,
"lastModified" : "2020-09-28T15:09:59.847" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file."
} ,
{
"lang" : "es" ,
"value" : "GStreamer anterior a 1.4.5, utilizado en Mozilla Firefox anterior a 38.0, Firefox ESR 31.x anterior a 31.7, y Thunderbird anterior a 31.7 en Linux, permite a atacantes remotos causar una denegaci\u00f3n de servicio (sobrelectura de buffer y ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de datos de v\u00eddeo H.264 manipulados en un fichero m4v."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 6.8
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.4.5" ,
"matchCriteriaId" : "B449652F-26D6-449F-B54D-3EEAF619A6D5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "38.0" ,
"matchCriteriaId" : "2ED8D3E0-15B9-46AE-98A8-7A596A8B23F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "31.0" ,
"versionEndExcluding" : "31.7" ,
"matchCriteriaId" : "6C5E23E7-2659-431E-910D-00F97BC025B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.35" ,
"matchCriteriaId" : "3655B513-F5EF-48FB-9F0E-FD7CF0789848"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "31.7" ,
"matchCriteriaId" : "285E4D39-2413-4355-AC77-53B964ECBECE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "38.0" ,
"versionEndExcluding" : "38.0.1" ,
"matchCriteriaId" : "DDDC43DD-D1E9-4694-9E79-3FF56B706BD6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "3ED68ADD-BBDA-4485-BC76-58F011D72311"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*" ,
"matchCriteriaId" : "E534C201-BCC5-473C-AAA7-AAB97CEB5437"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" ,
"matchCriteriaId" : "2470C6E8-2024-4CF5-9982-CFF50E88EAE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F7F8866-DEAD-44D1-AB10-21EE611AA026"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A67A7B7A-998D-4B8C-8831-6E58406565FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "807C024A-F8E8-4B48-A349-4C68CD252CA1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F96E3779-F56A-45FF-BB3D-4980527D721E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83737173-E12E-4641-BC49-0BD84A6B29D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BBCD86A-E6C7-4444-9D74-F861084090F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16E6D998-B41D-4B49-9E00-8336D2E40A4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98381E61-F082-4302-B51F-5648884F998B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D99A687E-EAE6-417E-A88E-D0082BC194CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B353CE99-D57C-465B-AAB0-73EF581127D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7431ABC1-9252-419E-8CC1-311B41360078"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13E02156-E748-4820-B76F-7074793837E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16F59A04-14CF-49E2-9973-645477EA09DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Broken Link"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0988.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1012.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3225" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3260" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2015/dsa-3264" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-47.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1080995" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Issue Tracking" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201512-07" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7" ,
"source" : "security@mozilla.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}