300 lines
9.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-7183",
"sourceIdentifier": "security@mozilla.org",
"published": "2015-11-05T05:59:07.883",
"lastModified": "2017-10-20T01:29:07.627",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de entero en la implementaci\u00f3n de PL_ARENA_ALLOCATE en Netscape Portable Runtime (NSPR) en Mozilla Network Security Services (NSS) en versiones anteriores a 3.19.2.1 y 3.20.x en versiones anteriores a 3.20.1, como se utiliza en Firefox en versiones anteriores a 42.0 y Firefox ESR 38.x en versiones anteriores a 38.4 y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndIncluding": "41.0.2",
"matchCriteriaId": "A741F21D-4095-47E0-AAB4-DDBDAAC5BAB1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.19.2.0",
"matchCriteriaId": "39EA735D-20A8-4595-BFF8-7B1F5A32CDA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95762E75-6DEC-4B1C-87B4-A4EA1937B710"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1DD76B-7682-4F61-B274-115D8A9B5306"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "332589F6-C6DB-4204-97FA-B60105BBF146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A04D6EAE-C709-4752-976E-DB15EE6E85B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE52B8E3-3BA8-46DB-948E-958739FE91B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "818D58B7-3BA2-4CE5-9D9A-65F5B24AB6D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B50189A6-C058-46EA-9BE8-9D01E304D518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5442BB-3E3F-4E91-B76B-6B379B47E2BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF3D499-08B8-4180-86C8-A38609D8938B"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html",
"source": "security@mozilla.org"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html",
"source": "security@mozilla.org"
},
{
"url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html",
"source": "security@mozilla.org"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html",
"source": "security@mozilla.org"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.debian.org/security/2015/dsa-3393",
"source": "security@mozilla.org"
},
{
"url": "http://www.debian.org/security/2015/dsa-3406",
"source": "security@mozilla.org"
},
{
"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"source": "security@mozilla.org"
},
{
"url": "http://www.securityfocus.com/bid/77415",
"source": "security@mozilla.org"
},
{
"url": "http://www.securityfocus.com/bid/91787",
"source": "security@mozilla.org"
},
{
"url": "http://www.securitytracker.com/id/1034069",
"source": "security@mozilla.org"
},
{
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753",
"source": "security@mozilla.org"
},
{
"url": "http://www.ubuntu.com/usn/USN-2785-1",
"source": "security@mozilla.org"
},
{
"url": "http://www.ubuntu.com/usn/USN-2790-1",
"source": "security@mozilla.org"
},
{
"url": "http://www.ubuntu.com/usn/USN-2819-1",
"source": "security@mozilla.org"
},
{
"url": "https://bto.bluecoat.com/security-advisory/sa119",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1205157",
"source": "security@mozilla.org"
},
{
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201512-10",
"source": "security@mozilla.org"
},
{
"url": "https://security.gentoo.org/glsa/201605-06",
"source": "security@mozilla.org"
}
]
}