var-201601-0495
Vulnerability from variot
Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126. libpng is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code on the affected system. Failed attacks will cause denial-of-service conditions. Note: This issue is the result of an incomplete fix for the issue described in 77568 (libpng CVE-2015-8126 Multiple Heap Based Buffer Overflow Vulnerabilities). The following versions are affected: libpng prior to 1.0.65, 1.1.x and 1.2.x prior to 1.2.55, 1.3.x, 1.4.x prior to 1.4.18, 1.5.x prior to 1.5.25, 1.6 1.6.x versions prior to .20. Description:
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494)
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All running instances of IBM Java must be restarted for the update to take effect. Bugs fixed (https://bugzilla.redhat.com/):
1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions 1289841 - CVE-2015-7575 TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) 1291312 - CVE-2015-8540 libpng: underflow read in png_check_keyword() 1298906 - CVE-2016-0494 ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) 1298957 - CVE-2016-0402 OpenJDK: URL deserialization inconsistencies (Networking, 8059054) 1299073 - CVE-2016-0448 OpenJDK: logging of RMI connection secrets (JMX, 8130710) 1299385 - CVE-2016-0466 OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) 1299441 - CVE-2016-0483 OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) 1302689 - CVE-2015-5041 IBM JDK: J9 JVM allows code to invoke non-public interface methods
- ============================================================================ Ubuntu Security Notice USN-2861-1 January 06, 2016
libpng vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
libpng could be made to crash or run programs as your login if it opened a specially crafted file. (CVE-2015-8472)
Qixue Xiao and Chen Yu discovered that libpng incorrectly handled certain malformed images. (CVE-2015-8540)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: libpng12-0 1.2.51-0ubuntu3.15.10.2
Ubuntu 15.04: libpng12-0 1.2.51-0ubuntu3.15.04.2
Ubuntu 14.04 LTS: libpng12-0 1.2.50-1ubuntu2.14.04.2
Ubuntu 12.04 LTS: libpng12-0 1.2.46-3ubuntu4.2
After a standard system update you need to restart your session to make all the necessary changes. 6) - i386, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: libpng12 security update Advisory ID: RHSA-2015:2595-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2595.html Issue date: 2015-12-09 CVE Names: CVE-2015-7981 CVE-2015-8126 CVE-2015-8472 =====================================================================
- Summary:
Updated libpng12 packages that fix three security issues are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The libpng12 packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.
It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472)
An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981)
All libpng12 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: libpng12-1.2.50-7.el7_2.src.rpm
x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: libpng12-1.2.50-7.el7_2.src.rpm
x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: libpng12-1.2.50-7.el7_2.src.rpm
aarch64: libpng12-1.2.50-7.el7_2.aarch64.rpm libpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm
ppc64: libpng12-1.2.50-7.el7_2.ppc.rpm libpng12-1.2.50-7.el7_2.ppc64.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm
ppc64le: libpng12-1.2.50-7.el7_2.ppc64le.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm
s390x: libpng12-1.2.50-7.el7_2.s390.rpm libpng12-1.2.50-7.el7_2.s390x.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm
x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: libpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm libpng12-devel-1.2.50-7.el7_2.aarch64.rpm
ppc64: libpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm libpng12-devel-1.2.50-7.el7_2.ppc.rpm libpng12-devel-1.2.50-7.el7_2.ppc64.rpm
ppc64le: libpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm libpng12-devel-1.2.50-7.el7_2.ppc64le.rpm
s390x: libpng12-debuginfo-1.2.50-7.el7_2.s390.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm libpng12-devel-1.2.50-7.el7_2.s390.rpm libpng12-devel-1.2.50-7.el7_2.s390x.rpm
x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: libpng12-1.2.50-7.el7_2.src.rpm
x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-7981 https://access.redhat.com/security/cve/CVE-2015-8126 https://access.redhat.com/security/cve/CVE-2015-8472 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD4DBQFWaEOWXlSAg2UNWIIRArqQAJiXHpRTjePlByUwb2yeLtnA6ZHDAJ483rVP N/LWwsGEwId3XWZYVPOUSQ== =s2GT -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4871, CVE-2015-4872, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4902, CVE-2015-4903, CVE-2015-5006, CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0264, CVE-2016-0363, CVE-2016-0376, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494, CVE-2016-0686, CVE-2016-0687, CVE-2016-3422, CVE-2016-3426, CVE-2016-3427, CVE-2016-3443, CVE-2016-3449)
Red Hat would like to thank Andrea Palazzo of Truel IT for reporting the CVE-2015-4806 issue. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
OS X El Capitan 10.11.4 and Security Update 2016-002 is now available and addresses the following:
apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team
AppleUSBNetworking Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of data from USB devices. This issue was addressed through improved input validation. CVE-ID CVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path
Bluetooth Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1735 : Jeonghoon Shin@A.D.D CVE-2016-1736 : beist and ABH of BoB
Carbon Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .dfont file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2016-1737 : an anonymous researcher
dyld Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker may tamper with code-signed applications to execute arbitrary code in the application's context Description: A code signing verification issue existed in dyld. This issue was addressed with improved validation. CVE-ID CVE-2016-1738 : beist and ABH of BoB
FontParser Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with Trend Micro's Zero Day Initiative (ZDI)
HTTPProtocol Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to execute arbitrary code Description: Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0. CVE-ID CVE-2015-8659
Intel Graphics Driver Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1743 : Piotr Bania of Cisco Talos CVE-2016-1744 : Ian Beer of Google Project Zero
IOFireWireFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1745 : sweetchip of Grayhash
IOGraphics Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
IOHIDFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1748 : Brandon Azad
IOUSBFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-ID CVE-2016-1750 : CESG
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition existed during the creation of new processes. This was addressed through improved state handling. CVE-ID CVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-ID CVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team
Kernel Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2016-1755 : Ian Beer of Google Project Zero CVE-2016-1759 : lokihardt
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1758 : Brandon Azad
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple integer overflows were addressed through improved input validation. CVE-ID CVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved validation. CVE-ID CVE-2016-1752 : CESG
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2015-1819 CVE-2015-5312 : David Drysdale of Google CVE-2015-7499 CVE-2015-7500 : Kostya Serebryany of Google CVE-2015-7942 : Kostya Serebryany of Google CVE-2015-8035 : gustavo.grieco CVE-2015-8242 : Hugh Davenport CVE-2016-1761 : wol0xff working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1762
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker who is able to bypass Apple's certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments Description: A cryptographic issue was addressed by rejecting duplicate messages on the client. CVE-ID CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan of Johns Hopkins University
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a JavaScript link can reveal sensitive user information Description: An issue existed in the processing of JavaScript links. This issue was addressed through improved content security policy checks. CVE-ID CVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of Bishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox
NVIDIA Graphics Drivers Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1741 : Ian Beer of Google Project Zero
OpenSSH Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Connecting to a server may leak sensitive user information, such as a client's private keys Description: Roaming, which was on by default in the OpenSSH client, exposed an information leak and a buffer overflow. These issues were addressed by disabling roaming in the client. CVE-ID CVE-2016-0777 : Qualys CVE-2016-0778 : Qualys
OpenSSH Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 : Qualys CVE-2015-5334 : Qualys
OpenSSL Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to cause a denial of service Description: A memory leak existed in OpenSSL versions prior to 0.9.8zh. This issue was addressed by updating OpenSSL to version 0.9.8zh. CVE-ID CVE-2015-3195
Python Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2014-9495 CVE-2015-0973 CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1767 : Francis Provencher from COSIG CVE-2016-1768 : Francis Provencher from COSIG
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1769 : Francis Provencher from COSIG
Reminders Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a tel link can make a call without prompting the user Description: A user was not prompted before invoking a call. This was addressed through improved entitlement checks. CVE-ID CVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of Laurent.ca
Ruby Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An unsafe tainted string usage vulnerability existed in versions prior to 2.0.0-p648. This issue was addressed by updating to version 2.0.0-p648. CVE-ID CVE-2015-7551
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to check for the existence of arbitrary files Description: A permissions issue existed in code signing tools. This was addressed though additional ownership checks. CVE-ID CVE-2016-1773 : Mark Mentovai of Google Inc.
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation. CVE-ID CVE-2016-1950 : Francis Gabriel of Quarkslab
Tcl
Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3
Impact: Processing a maliciously crafted .png file may lead to
arbitrary code execution
Description: Multiple vulnerabilities existed in libpng versions
prior to 1.6.20. These were addressed by removing libpng.
CVE-ID
CVE-2015-8126 : Adam Mariš
TrueTypeScaler Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI)
Wi-Fi Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling. CVE-ID CVE-2016-0801 : an anonymous researcher CVE-2016-0802 : an anonymous researcher
OS X El Capitan 10.11.4 includes the security content of Safari 9.1. https://support.apple.com/kb/HT206171
OS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJW8JQFAAoJEBcWfLTuOo7tZSYP/1bHFA1qemkD37uu7nYpk/q6 ARVsPgME1I1+5tOxX0TQJgzMBmdQsKYdsTiLpDk5HTuv+dAMsFfasaUItGk8Sz1w HiYjSfVsxL+Pjz3vK8/4/fsi2lX6472MElRw8gudITOhXtniGcKo/vuA5dB+vM3l Jy1NLHHhZ6BD2t0bBmlz41mZMG3AMxal2wfqE+5LkjUwASzcvC/3B1sh7Fntwyau /71vIgMQ5AaETdgQJAuQivxPyTlFduBRgLjqvPiB9eSK4Ctu5t/hErFIrP2NiDCi UhfZC48XbiRjJfkUsUD/5TIKnI+jkZxOnch9ny32dw2kUIkbIAbqufTkzsMXOpng O+rI93Ni7nfzgI3EkI2bq+C+arOoRiveWuJvc3SMPD5RQHo4NCQVs0ekQJKNHF78 juPnY29n8WMjwLS6Zfm+bH+n8ELIXrmmEscRztK2efa9S7vJe+AgIxx7JE/f8OHF i9K7UQBXFXcpMjXi1aTby/IUnpL5Ny4NVwYwIhctj0Mf6wTH7uf/FMWYIQOXcIfP Izo+GXxNeLd4H2ypZ+UpkZg/Sn2mtCd88wLc96+owlZPBlSqWl3X1wTlp8i5FP2X qlQ7RcTHJDv8jPT/MOfzxEK1n/azp45ahHA0o6nohUdxlA7PLci9vPiJxqKPo/0q VZmOKa8qMxB1L/JmdCqy =mZR+ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0495", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.5.1" }, { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.4.17" }, { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.5.4" }, { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.5.5" }, { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.5.2" }, { "model": "libpng", "scope": "eq", "trust": 1.9, "vendor": "libpng", "version": "1.5.6" }, { "model": "libpng", "scope": "eq", "trust": 1.6, "vendor": "libpng", "version": "1.4.15" }, { "model": "libpng", "scope": "eq", "trust": 1.6, "vendor": "libpng", "version": "1.4.16" }, { "model": "libpng", "scope": "eq", "trust": 1.6, "vendor": "libpng", "version": "1.4.14" }, { "model": "libpng", "scope": "eq", "trust": 1.6, "vendor": "libpng", "version": "1.5.3" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.3" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.42" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.16" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.29" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.47" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.16" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.21" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.49" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.44" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.5" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.12" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.36" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.1" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.14" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.30" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.11" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.9" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.18" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.24" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.6" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.7" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.7" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.11" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.41" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.3" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.8" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.4" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.20" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.0" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.15" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.27" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.33" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.11" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.4" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.0" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.21" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.15" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.1" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.10" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.4" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.5" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.10" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.26" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.22" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.7" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.40" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.28" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.25" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.10" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.19" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.2" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.3" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.11" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.38" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.9" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.45" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.8" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.39" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.34" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.23" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.12" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.2" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.17" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.54" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.0.64" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.37" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.24" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.46" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.5.13" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.43" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.4.8" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.1" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.48" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.13" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.10" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.9" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.2" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.35" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.6.6" }, { "model": "libpng", "scope": "eq", "trust": 1.3, "vendor": "libpng", "version": "1.2.19" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.6.12" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.4.12" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.14" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.6.14" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.15" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.18" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.19" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.50" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.23" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.20" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.22" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.52" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.31" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.4.0" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.53" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.3" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.51" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.6.18" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.17" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.4.13" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.5.16" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.6.17" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.6.13" }, { "model": "libpng", "scope": "eq", "trust": 1.0, "vendor": "libpng", "version": "1.2.32" }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.866" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.866" }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.865" }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.791" }, { "model": "jre update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.6105" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.865" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.791" }, { "model": "jdk update", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.6105" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.25" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.50" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.18" }, { "model": "websphere real time sr8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "ilog optimization decision manager enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.306" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.4.0.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.39" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.4" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.50" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.23" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.33" }, { "model": "powerkvm build", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.165.6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.22" }, { "model": "filenet system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.3" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.31" }, { "model": "websphere real time", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "decision optimization center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "websphere real time sr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.6" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5.1" }, { "model": "libpng", "scope": "ne", "trust": 0.3, "vendor": "libpng", "version": "1.4.18" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.157" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.54" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.2" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.47" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.28" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.42" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.5" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.31" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.15" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "smartcloud provisioning for software virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "tivoli network manager if0002 ip editio", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.1" }, { "model": "libpng", "scope": "ne", "trust": 0.3, "vendor": "libpng", "version": "1.0.65" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.1" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.4" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.31" }, { "model": "websphere real time sr6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "websphere real time sr9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "powerkvm sp3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "websphere real time sr4-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "fabric manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.2" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.4" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "ilog optimization decision manager enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2.8" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.11" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.27" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.13" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3.3" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2.9" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.19" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.14" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.12" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.305" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.8" }, { "model": "libpng", "scope": "ne", "trust": 0.3, "vendor": "libpng", "version": "1.2.55" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.3" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.303" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.0.1" }, { "model": "ilog optimization decision manager enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.2" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.32" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "0.90" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.40" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "decision optimization center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.7.0.2" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.59" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2.7" }, { "model": "websphere message broker toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.24" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.43" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5.0.1" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3.5" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.4.0.1" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3.1" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "websphere real time sr7 fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2.6" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "fabric manager", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.1.04.0048" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.33" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.35" }, { "model": "enterprise content management system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.4" }, { "model": "decision optimization center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.7" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.56" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.41" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3" }, { "model": "websphere real time sr7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5" }, { "model": "websphere real time sr fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3920" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.21" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.9" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6.0.1" }, { "model": "libpng", "scope": "ne", "trust": 0.3, "vendor": "libpng", "version": "1.5.25" }, { "model": "enterprise content management system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.30" }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2016-0020" }, { "model": "websphere real time", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.35" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.6" }, { "model": "websphere real time sr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "39" }, { "model": "linux enterprise server sp4 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.58" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.51" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.303" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.6" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "libpng", "scope": "ne", "trust": 0.3, "vendor": "libpng", "version": "1.6.20" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "forms viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.45" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2" }, { "model": "expeditor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.32" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.17" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.44" }, { "model": "websphere real time", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "websphere real time sr fp", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3930" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.34" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.46" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.1" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.7" }, { "model": "websphere real time sr5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.55" }, { "model": "websphere real time sr8 fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.165.4" }, { "model": "linux enterprise module for legacy software", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.52" }, { "model": "cplex enterprise server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "decision optimization center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8.0.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.48" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "tivoli network manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.165.1" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "integration toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.32" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.2.5" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.29" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.26" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.11" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.57" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.165.5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "decision optimization center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.38" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5.1" }, { "model": "websphere real time sr fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3810" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.37" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.16" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.53" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.20" }, { "model": "libpng", "scope": "eq", "trust": 0.3, "vendor": "libpng", "version": "1.0.10" }, { "model": "ilog optimization decision manager enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.7.0.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tivoli monitoring fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.302" }, { "model": "websphere real time sr9 fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.3.4" }, { "model": "powerkvm build", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.13" }, { "model": "powerkvm build", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.158" }, { "model": "cplex optimization studio", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "12.5.0.1" } ], "sources": [ { "db": "BID", "id": "78624" }, { "db": "CNNVD", "id": "CNNVD-201512-189" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Glenn Randers-Pehrson", "sources": [ { "db": "BID", "id": "78624" }, { "db": "CNNVD", "id": "CNNVD-201512-189" } ], "trust": 0.9 }, "cve": "CVE-2015-8472", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-8472", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-86433", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2015-8472", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-8472", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201512-189", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86433", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-8472", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-86433" }, { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "CNNVD", "id": "CNNVD-201512-189" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126. libpng is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. \nAttackers may leverage this issue to execute arbitrary code on the affected system. Failed attacks will cause denial-of-service conditions. \nNote: This issue is the result of an incomplete fix for the issue described in 77568 (libpng CVE-2015-8126 Multiple Heap Based Buffer Overflow Vulnerabilities). The following versions are affected: libpng prior to 1.0.65, 1.1.x and 1.2.x prior to 1.2.55, 1.3.x, 1.4.x prior to 1.4.18, 1.5.x prior to 1.5.25, 1.6 1.6.x versions prior to .20. Description:\n\nIBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM\nJava Software Development Kit. \n\nThis update fixes several vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Further information\nabout these flaws can be found on the IBM Java Security alerts page, listed\nin the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981,\nCVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448,\nCVE-2016-0466, CVE-2016-0483, CVE-2016-0494)\n\nNote: This update also disallows the use of the MD5 hash algorithm in the\ncertification path processing. The use of MD5 can be re-enabled by removing\nMD5 from the jdk.certpath.disabledAlgorithms security property defined in\nthe java.security file. All running\ninstances of IBM Java must be restarted for the update to take effect. Bugs fixed (https://bugzilla.redhat.com/):\n\n1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123\n1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions\n1289841 - CVE-2015-7575 TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)\n1291312 - CVE-2015-8540 libpng: underflow read in png_check_keyword()\n1298906 - CVE-2016-0494 ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)\n1298957 - CVE-2016-0402 OpenJDK: URL deserialization inconsistencies (Networking, 8059054)\n1299073 - CVE-2016-0448 OpenJDK: logging of RMI connection secrets (JMX, 8130710)\n1299385 - CVE-2016-0466 OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962)\n1299441 - CVE-2016-0483 OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017)\n1302689 - CVE-2015-5041 IBM JDK: J9 JVM allows code to invoke non-public interface methods\n\n6. ============================================================================\nUbuntu Security Notice USN-2861-1\nJanuary 06, 2016\n\nlibpng vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.10\n- Ubuntu 15.04\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nlibpng could be made to crash or run programs as your login if it opened a\nspecially crafted file. (CVE-2015-8472)\n\nQixue Xiao and Chen Yu discovered that libpng incorrectly handled certain\nmalformed images. (CVE-2015-8540)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.10:\n libpng12-0 1.2.51-0ubuntu3.15.10.2\n\nUbuntu 15.04:\n libpng12-0 1.2.51-0ubuntu3.15.04.2\n\nUbuntu 14.04 LTS:\n libpng12-0 1.2.50-1ubuntu2.14.04.2\n\nUbuntu 12.04 LTS:\n libpng12-0 1.2.46-3ubuntu4.2\n\nAfter a standard system update you need to restart your session to make\nall the necessary changes. 6) - i386, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: libpng12 security update\nAdvisory ID: RHSA-2015:2595-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-2595.html\nIssue date: 2015-12-09\nCVE Names: CVE-2015-7981 CVE-2015-8126 CVE-2015-8472 \n=====================================================================\n\n1. Summary:\n\nUpdated libpng12 packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which\ngive detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe libpng12 packages contain a library of functions for creating and\nmanipulating PNG (Portable Network Graphics) image format files. \n\nIt was discovered that the png_get_PLTE() and png_set_PLTE() functions of\nlibpng did not correctly calculate the maximum palette sizes for bit depths\nof less than 8. In case an application tried to use these functions in\ncombination with properly calculated palette sizes, this could lead to a\nbuffer overflow or out-of-bounds reads. An attacker could exploit this to\ncause a crash or potentially execute arbitrary code by tricking an\nunsuspecting user into processing a specially crafted PNG image. However,\nthe exact impact is dependent on the application using the library. \n(CVE-2015-8126, CVE-2015-8472)\n\nAn array-indexing error was discovered in the png_convert_to_rfc1123()\nfunction of libpng. An attacker could possibly use this flaw to cause an\nout-of-bounds read by tricking an unsuspecting user into processing a\nspecially crafted PNG image. (CVE-2015-7981)\n\nAll libpng12 users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123\n1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nlibpng12-1.2.50-7.el7_2.src.rpm\n\nx86_64:\nlibpng12-1.2.50-7.el7_2.i686.rpm\nlibpng12-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-devel-1.2.50-7.el7_2.i686.rpm\nlibpng12-devel-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nlibpng12-1.2.50-7.el7_2.src.rpm\n\nx86_64:\nlibpng12-1.2.50-7.el7_2.i686.rpm\nlibpng12-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-devel-1.2.50-7.el7_2.i686.rpm\nlibpng12-devel-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nlibpng12-1.2.50-7.el7_2.src.rpm\n\naarch64:\nlibpng12-1.2.50-7.el7_2.aarch64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm\n\nppc64:\nlibpng12-1.2.50-7.el7_2.ppc.rpm\nlibpng12-1.2.50-7.el7_2.ppc64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm\n\nppc64le:\nlibpng12-1.2.50-7.el7_2.ppc64le.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm\n\ns390x:\nlibpng12-1.2.50-7.el7_2.s390.rpm\nlibpng12-1.2.50-7.el7_2.s390x.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.s390.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm\n\nx86_64:\nlibpng12-1.2.50-7.el7_2.i686.rpm\nlibpng12-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\nlibpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm\nlibpng12-devel-1.2.50-7.el7_2.aarch64.rpm\n\nppc64:\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm\nlibpng12-devel-1.2.50-7.el7_2.ppc.rpm\nlibpng12-devel-1.2.50-7.el7_2.ppc64.rpm\n\nppc64le:\nlibpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm\nlibpng12-devel-1.2.50-7.el7_2.ppc64le.rpm\n\ns390x:\nlibpng12-debuginfo-1.2.50-7.el7_2.s390.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm\nlibpng12-devel-1.2.50-7.el7_2.s390.rpm\nlibpng12-devel-1.2.50-7.el7_2.s390x.rpm\n\nx86_64:\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-devel-1.2.50-7.el7_2.i686.rpm\nlibpng12-devel-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nlibpng12-1.2.50-7.el7_2.src.rpm\n\nx86_64:\nlibpng12-1.2.50-7.el7_2.i686.rpm\nlibpng12-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nlibpng12-debuginfo-1.2.50-7.el7_2.i686.rpm\nlibpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm\nlibpng12-devel-1.2.50-7.el7_2.i686.rpm\nlibpng12-devel-1.2.50-7.el7_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-7981\nhttps://access.redhat.com/security/cve/CVE-2015-8126\nhttps://access.redhat.com/security/cve/CVE-2015-8472\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD4DBQFWaEOWXlSAg2UNWIIRArqQAJiXHpRTjePlByUwb2yeLtnA6ZHDAJ483rVP\nN/LWwsGEwId3XWZYVPOUSQ==\n=s2GT\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2015-4734, CVE-2015-4803, CVE-2015-4805,\nCVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842,\nCVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4871, CVE-2015-4872,\nCVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4902, CVE-2015-4903,\nCVE-2015-5006, CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126,\nCVE-2015-8472, CVE-2015-8540, CVE-2016-0264, CVE-2016-0363, CVE-2016-0376,\nCVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494,\nCVE-2016-0686, CVE-2016-0687, CVE-2016-3422, CVE-2016-3426, CVE-2016-3427,\nCVE-2016-3443, CVE-2016-3449)\n\nRed Hat would like to thank Andrea Palazzo of Truel IT for reporting the\nCVE-2015-4806 issue. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update\n2016-002\n\nOS X El Capitan 10.11.4 and Security Update 2016-002 is now available\nand addresses the following:\n\napache_mod_php\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2015-8126 : Adam Mari\u0161\nCVE-2015-8472 : Adam Mari\u0161\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team\n\nAppleUSBNetworking\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the parsing of\ndata from USB devices. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path\n\nBluetooth\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1735 : Jeonghoon Shin@A.D.D\nCVE-2016-1736 : beist and ABH of BoB\n\nCarbon\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .dfont file may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues existed in the\nhandling of font files. These issues were addressed through improved\nbounds checking. \nCVE-ID\nCVE-2016-1737 : an anonymous researcher\n\ndyld\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker may tamper with code-signed applications to\nexecute arbitrary code in the application\u0027s context\nDescription: A code signing verification issue existed in dyld. This\nissue was addressed with improved validation. \nCVE-ID\nCVE-2016-1738 : beist and ABH of BoB\n\nFontParser\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with\nTrend Micro\u0027s Zero Day Initiative (ZDI)\n\nHTTPProtocol\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple vulnerabilities existed in nghttp2 versions\nprior to 1.6.0, the most serious of which may have led to remote code\nexecution. These were addressed by updating nghttp2 to version 1.6.0. \nCVE-ID\nCVE-2015-8659\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1743 : Piotr Bania of Cisco Talos\nCVE-2016-1744 : Ian Beer of Google Project Zero\n\nIOFireWireFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to cause a denial of service\nDescription: A null pointer dereference was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1745 : sweetchip of Grayhash\n\nIOGraphics\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro\u0027s\nZero Day Initiative (ZDI)\nCVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro\u0027s\nZero Day Initiative (ZDI)\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1748 : Brandon Azad\n\nIOUSBFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of\nTrend Micro working with Trend Micro\u0027s Zero Day Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2016-1750 : CESG\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition existed during the creation of new\nprocesses. This was addressed through improved state handling. \nCVE-ID\nCVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team\n\nKernel\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2016-1755 : Ian Beer of Google Project Zero\nCVE-2016-1759 : lokihardt\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1758 : Brandon Azad\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple integer overflows were addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to cause a denial of service\nDescription: A denial of service issue was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1752 : CESG\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-1819\nCVE-2015-5312 : David Drysdale of Google\nCVE-2015-7499\nCVE-2015-7500 : Kostya Serebryany of Google\nCVE-2015-7942 : Kostya Serebryany of Google\nCVE-2015-8035 : gustavo.grieco\nCVE-2015-8242 : Hugh Davenport\nCVE-2016-1761 : wol0xff working with Trend Micro\u0027s Zero Day\nInitiative (ZDI)\nCVE-2016-1762\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker who is able to bypass Apple\u0027s certificate\npinning, intercept TLS connections, inject messages, and record\nencrypted attachment-type messages may be able to read attachments\nDescription: A cryptographic issue was addressed by rejecting\nduplicate messages on the client. \nCVE-ID\nCVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk,\nIan Miers, and Michael Rushanan of Johns Hopkins University\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a JavaScript link can reveal sensitive user\ninformation\nDescription: An issue existed in the processing of JavaScript links. \nThis issue was addressed through improved content security policy\nchecks. \nCVE-ID\nCVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of\nBishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox\n\nNVIDIA Graphics Drivers\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1741 : Ian Beer of Google Project Zero\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Connecting to a server may leak sensitive user information,\nsuch as a client\u0027s private keys\nDescription: Roaming, which was on by default in the OpenSSH client,\nexposed an information leak and a buffer overflow. These issues were\naddressed by disabling roaming in the client. \nCVE-ID\nCVE-2016-0777 : Qualys\nCVE-2016-0778 : Qualys\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5\nImpact: Multiple vulnerabilities in LibreSSL\nDescription: Multiple vulnerabilities existed in LibreSSL versions\nprior to 2.1.8. These were addressed by updating LibreSSL to version\n2.1.8. \nCVE-ID\nCVE-2015-5333 : Qualys\nCVE-2015-5334 : Qualys\n\nOpenSSL\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A memory leak existed in OpenSSL versions prior to\n0.9.8zh. This issue was addressed by updating OpenSSL to version\n0.9.8zh. \nCVE-ID\nCVE-2015-3195\n\nPython\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2014-9495\nCVE-2015-0973\nCVE-2015-8126 : Adam Mari\u0161\nCVE-2015-8472 : Adam Mari\u0161\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1767 : Francis Provencher from COSIG\nCVE-2016-1768 : Francis Provencher from COSIG\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1769 : Francis Provencher from COSIG\n\nReminders\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a tel link can make a call without prompting the\nuser\nDescription: A user was not prompted before invoking a call. This\nwas addressed through improved entitlement checks. \nCVE-ID\nCVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of\nLaurent.ca\n\nRuby\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An unsafe tainted string usage vulnerability existed in\nversions prior to 2.0.0-p648. This issue was addressed by updating to\nversion 2.0.0-p648. \nCVE-ID\nCVE-2015-7551\n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to check for the existence of\narbitrary files\nDescription: A permissions issue existed in code signing tools. This\nwas addressed though additional ownership checks. \nCVE-ID\nCVE-2016-1773 : Mark Mentovai of Google Inc. \n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the ASN.1 decoder. \nThis issue was addressed through improved input validation. \nCVE-ID\nCVE-2016-1950 : Francis Gabriel of Quarkslab\n\nTcl\nAvailable for: \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by removing libpng. \nCVE-ID\nCVE-2015-8126 : Adam Mari\u0161\n\nTrueTypeScaler\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2016-1775 : 0x1byte working with Trend Micro\u0027s Zero Day\nInitiative (ZDI)\n\nWi-Fi\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker with a privileged network position may be able\nto execute arbitrary code\nDescription: A frame validation and memory corruption issue existed\nfor a given ethertype. This issue was addressed through additional\nethertype validation and improved memory handling. \nCVE-ID\nCVE-2016-0801 : an anonymous researcher\nCVE-2016-0802 : an anonymous researcher\n\nOS X El Capitan 10.11.4 includes the security content of Safari 9.1. \nhttps://support.apple.com/kb/HT206171\n\nOS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nVZmOKa8qMxB1L/JmdCqy\n=mZR+\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-8472" }, { "db": "BID", "id": "78624" }, { "db": "VULHUB", "id": "VHN-86433" }, { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "PACKETSTORM", "id": "135558" }, { "db": "PACKETSTORM", "id": "135153" }, { "db": "PACKETSTORM", "id": "135338" }, { "db": "PACKETSTORM", "id": "134720" }, { "db": "PACKETSTORM", "id": "134722" }, { "db": "PACKETSTORM", "id": "134719" }, { "db": "PACKETSTORM", "id": "137932" }, { "db": "PACKETSTORM", "id": "136346" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-86433", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-86433" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8472", "trust": 2.9 }, { "db": "BID", "id": "78624", "trust": 1.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2015/12/03/6", "trust": 1.2 }, { "db": "MCAFEE", "id": "SB10148", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-201512-189", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "135153", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "135265", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134874", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-86433", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-8472", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135558", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135338", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134720", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134722", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134719", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137932", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136346", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86433" }, { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "BID", "id": "78624" }, { "db": "PACKETSTORM", "id": "135558" }, { "db": "PACKETSTORM", "id": "135153" }, { "db": "PACKETSTORM", "id": "135338" }, { "db": "PACKETSTORM", "id": "134720" }, { "db": "PACKETSTORM", "id": "134722" }, { "db": "PACKETSTORM", "id": "134719" }, { "db": "PACKETSTORM", "id": "137932" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "CNNVD", "id": "CNNVD-201512-189" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "id": "VAR-201601-0495", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-86433" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T20:29:24.339000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "libpng Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59039" }, { "title": "Red Hat: Moderate: libpng security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20152596 - Security Advisory" }, { "title": "Red Hat: Moderate: libpng12 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20152595 - Security Advisory" }, { "title": "Red Hat: Moderate: libpng security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20152594 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: libpng: CVE-2015-8540: read underflow in libpng", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=0a130e26709c1ba00694161c08b9c604" }, { "title": "Ubuntu Security Notice: libpng vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2861-1" }, { "title": "Debian CVElist Bug Report Logs: libpng: Incomplete fix for CVE-2015-8126", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=386e683fecec564e81371b5dca873869" }, { "title": "Debian Security Advisories: DSA-3443-1 libpng -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=57e4bc5fc071e2986f7cef65414ffe23" }, { "title": "Red Hat: CVE-2015-8472", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2015-8472" }, { "title": "Amazon Linux AMI: ALAS-2015-615", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2015-615" }, { "title": "Apple: OS X El Capitan v10.11.4 and Security Update 2016-002", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=ef054ba76412200e34091eb91c38c281" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=435ed9abc2fb1e74ce2a69605a01e326" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=63802a6c83b107c4e6e0c7f9241a66a8" }, { "title": "IBM: Security Bulletin: Multiple vulnerabilities in IBM Java affect IBM Netezza Analytics for NPS", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c36fc403a4c2c6439b732d2fca738f58" }, { "title": "clair-lab", "trust": 0.1, "url": "https://github.com/sjourdan/clair-lab " } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "CNNVD", "id": "CNNVD-201512-189" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86433" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.5, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "trust": 1.5, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/78624" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2015-2594.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2015-2595.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2015-2596.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2016-0057.html" }, { "trust": 1.3, "url": "https://access.redhat.com/errata/rhsa-2016:1430" }, { "trust": 1.2, "url": "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html" }, { "trust": 1.2, "url": "http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/" }, { "trust": 1.2, "url": "http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/" }, { "trust": 1.2, "url": "http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/" }, { "trust": 1.2, "url": "http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/" }, { "trust": 1.2, "url": "http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/" }, { "trust": 1.2, "url": "https://support.apple.com/ht206167" }, { "trust": 1.2, "url": "http://www.debian.org/security/2016/dsa-3443" }, { "trust": 1.2, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/174936.html" }, { "trust": 1.2, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/175073.html" }, { "trust": 1.2, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/174905.html" }, { "trust": 1.2, "url": "http://www.openwall.com/lists/oss-security/2015/12/03/6" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2016-0055.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2016-0056.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10148" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8472" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8126" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2015-8126" }, { "trust": 0.6, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2015-8472" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-affect-ibm-netezza-analytics/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-affect-ibm-netezza-analytics-for-nps/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-jre-8-0-1-1-affect-ibm-netezza-platform-software-clients/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2015-7981" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7981" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "http://www.libpng.org/pub/png/libpng.html" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2015/q4/428" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023374" }, { "trust": 0.3, "url": " https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099293" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982337" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21979528" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978310" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21979761" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21973231" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974194" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975785" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975835" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975904" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975929" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975930" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976631" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976779" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976855" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976924" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21977053" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983487" }, { "trust": 0.3, "url": "https://www-01.ibm.com/support/docview.wss?uid=swg21984483" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000115" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-0448" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-0483" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8540" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-0402" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-0466" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-0494" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0448" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7575" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0466" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-7575" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0483" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5041" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-8540" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0494" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-5041" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0402" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10148" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2015:2596" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2861-1/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=43094" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://www.ibm.com/developerworks/java/jdk/alerts/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2016-0101.html" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libpng/1.2.51-0ubuntu3.15.04.2" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2861-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libpng/1.2.51-0ubuntu3.15.10.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libpng/1.2.46-3ubuntu4.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libpng/1.2.50-1ubuntu2.14.04.2" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#appendixjava" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4882" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4903" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4872" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4844" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4806" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0363" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0264" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4871" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4860" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4871" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0376" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4803" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0376" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4734" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4860" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4842" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4843" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4835" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4903" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4902" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4810" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4893" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3443" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0363" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4882" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4843" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4835" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4810" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4902" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4872" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0686" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4734" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4803" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4806" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4844" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-5006" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5006" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0687" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0264" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7551" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0777" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8659" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1819" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0801" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8242" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht206171" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1732" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5312" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7500" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9495" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1734" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1733" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1735" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0778" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1738" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1737" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0973" } ], "sources": [ { "db": "VULHUB", "id": "VHN-86433" }, { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "BID", "id": "78624" }, { "db": "PACKETSTORM", "id": "135558" }, { "db": "PACKETSTORM", "id": "135153" }, { "db": "PACKETSTORM", "id": "135338" }, { "db": "PACKETSTORM", "id": "134720" }, { "db": "PACKETSTORM", "id": "134722" }, { "db": "PACKETSTORM", "id": "134719" }, { "db": "PACKETSTORM", "id": "137932" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "CNNVD", "id": "CNNVD-201512-189" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-86433" }, { "db": "VULMON", "id": "CVE-2015-8472" }, { "db": "BID", "id": "78624" }, { "db": "PACKETSTORM", "id": "135558" }, { "db": "PACKETSTORM", "id": "135153" }, { "db": "PACKETSTORM", "id": "135338" }, { "db": "PACKETSTORM", "id": "134720" }, { "db": "PACKETSTORM", "id": "134722" }, { "db": "PACKETSTORM", "id": "134719" }, { "db": "PACKETSTORM", "id": "137932" }, { "db": "PACKETSTORM", "id": "136346" }, { "db": "CNNVD", "id": "CNNVD-201512-189" }, { "db": "NVD", "id": "CVE-2015-8472" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-21T00:00:00", "db": "VULHUB", "id": "VHN-86433" }, { "date": "2016-01-21T00:00:00", "db": "VULMON", "id": "CVE-2015-8472" }, { "date": "2015-12-03T00:00:00", "db": "BID", "id": "78624" }, { "date": "2016-02-02T16:44:18", "db": "PACKETSTORM", "id": "135558" }, { "date": "2016-01-07T00:11:25", "db": "PACKETSTORM", "id": "135153" }, { "date": "2016-01-21T14:47:29", "db": "PACKETSTORM", "id": "135338" }, { "date": "2015-12-10T00:39:58", "db": "PACKETSTORM", "id": "134720" }, { "date": "2015-12-10T00:40:23", "db": "PACKETSTORM", "id": "134722" }, { "date": "2015-12-10T00:39:51", "db": "PACKETSTORM", "id": "134719" }, { "date": "2016-07-18T19:51:43", "db": "PACKETSTORM", "id": "137932" }, { "date": "2016-03-22T15:18:02", "db": "PACKETSTORM", "id": "136346" }, { "date": "2015-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-189" }, { "date": "2016-01-21T15:59:00.117000", "db": "NVD", "id": "CVE-2015-8472" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-04T00:00:00", "db": "VULHUB", "id": "VHN-86433" }, { "date": "2017-11-04T00:00:00", "db": "VULMON", "id": "CVE-2015-8472" }, { "date": "2016-08-02T17:01:00", "db": "BID", "id": "78624" }, { "date": "2021-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-189" }, { "date": "2024-11-21T02:38:36.297000", "db": "NVD", "id": "CVE-2015-8472" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-189" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libpng Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-189" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-189" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.