var-201603-0118
Vulnerability from variot
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in mediaservers prior to GoogleNexusBuildsLMY49H. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201603-09
https://security.gentoo.org/
Severity: Normal Title: Chromium: Multiple vulnerabilities Date: March 12, 2016 Bugs: #555640, #559384, #561448, #563098, #565510, #567308, #567870, #568396, #572542, #574416, #575434, #576354, #576858 ID: 201603-09
Synopsis
Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code.
Background
Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 49.0.2623.87 >= 49.0.2623.87
Description
Multiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-49.0.2623.87"
References
[ 1 ] CVE-2015-1270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270 [ 2 ] CVE-2015-1271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271 [ 3 ] CVE-2015-1272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272 [ 4 ] CVE-2015-1273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273 [ 5 ] CVE-2015-1274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274 [ 6 ] CVE-2015-1275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275 [ 7 ] CVE-2015-1276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276 [ 8 ] CVE-2015-1277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277 [ 9 ] CVE-2015-1278 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278 [ 10 ] CVE-2015-1279 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279 [ 11 ] CVE-2015-1280 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280 [ 12 ] CVE-2015-1281 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281 [ 13 ] CVE-2015-1282 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282 [ 14 ] CVE-2015-1283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283 [ 15 ] CVE-2015-1284 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284 [ 16 ] CVE-2015-1285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285 [ 17 ] CVE-2015-1286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286 [ 18 ] CVE-2015-1287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287 [ 19 ] CVE-2015-1288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288 [ 20 ] CVE-2015-1289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289 [ 21 ] CVE-2015-1291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291 [ 22 ] CVE-2015-1292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292 [ 23 ] CVE-2015-1293 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293 [ 24 ] CVE-2015-1294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294 [ 25 ] CVE-2015-1295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295 [ 26 ] CVE-2015-1296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296 [ 27 ] CVE-2015-1297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297 [ 28 ] CVE-2015-1298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298 [ 29 ] CVE-2015-1299 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299 [ 30 ] CVE-2015-1300 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300 [ 31 ] CVE-2015-1302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302 [ 32 ] CVE-2015-1303 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303 [ 33 ] CVE-2015-1304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304 [ 34 ] CVE-2015-6755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755 [ 35 ] CVE-2015-6756 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756 [ 36 ] CVE-2015-6757 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757 [ 37 ] CVE-2015-6758 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758 [ 38 ] CVE-2015-6759 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759 [ 39 ] CVE-2015-6760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760 [ 40 ] CVE-2015-6761 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761 [ 41 ] CVE-2015-6762 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762 [ 42 ] CVE-2015-6763 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763 [ 43 ] CVE-2015-6764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764 [ 44 ] CVE-2015-6765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765 [ 45 ] CVE-2015-6766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766 [ 46 ] CVE-2015-6767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767 [ 47 ] CVE-2015-6768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768 [ 48 ] CVE-2015-6769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769 [ 49 ] CVE-2015-6770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770 [ 50 ] CVE-2015-6771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771 [ 51 ] CVE-2015-6772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772 [ 52 ] CVE-2015-6773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773 [ 53 ] CVE-2015-6774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774 [ 54 ] CVE-2015-6775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775 [ 55 ] CVE-2015-6776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776 [ 56 ] CVE-2015-6777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777 [ 57 ] CVE-2015-6778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778 [ 58 ] CVE-2015-6779 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779 [ 59 ] CVE-2015-6780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780 [ 60 ] CVE-2015-6781 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781 [ 61 ] CVE-2015-6782 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782 [ 62 ] CVE-2015-6783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783 [ 63 ] CVE-2015-6784 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784 [ 64 ] CVE-2015-6785 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785 [ 65 ] CVE-2015-6786 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786 [ 66 ] CVE-2015-6787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787 [ 67 ] CVE-2015-6788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788 [ 68 ] CVE-2015-6789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789 [ 69 ] CVE-2015-6790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790 [ 70 ] CVE-2015-6791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791 [ 71 ] CVE-2015-6792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792 [ 72 ] CVE-2015-8126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126 [ 73 ] CVE-2016-1612 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612 [ 74 ] CVE-2016-1613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613 [ 75 ] CVE-2016-1614 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614 [ 76 ] CVE-2016-1615 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615 [ 77 ] CVE-2016-1616 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616 [ 78 ] CVE-2016-1617 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617 [ 79 ] CVE-2016-1618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618 [ 80 ] CVE-2016-1619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619 [ 81 ] CVE-2016-1620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620 [ 82 ] CVE-2016-1621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621 [ 83 ] CVE-2016-1622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622 [ 84 ] CVE-2016-1623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623 [ 85 ] CVE-2016-1624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624 [ 86 ] CVE-2016-1625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625 [ 87 ] CVE-2016-1626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626 [ 88 ] CVE-2016-1627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627 [ 89 ] CVE-2016-1628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628 [ 90 ] CVE-2016-1629 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629 [ 91 ] CVE-2016-1630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630 [ 92 ] CVE-2016-1631 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631 [ 93 ] CVE-2016-1632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632 [ 94 ] CVE-2016-1633 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633 [ 95 ] CVE-2016-1634 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634 [ 96 ] CVE-2016-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635 [ 97 ] CVE-2016-1636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636 [ 98 ] CVE-2016-1637 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637 [ 99 ] CVE-2016-1638 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638 [ 100 ] CVE-2016-1639 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639 [ 101 ] CVE-2016-1640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640 [ 102 ] CVE-2016-1641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201603-09
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0118", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.0.2" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.1.0" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.1" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "6.0" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.0.1" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "4.4.3" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "4.4.2" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.1.1" }, { "model": "android", "scope": "eq", "trust": 1.6, "vendor": "google", "version": "5.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.1.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.3.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.4" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0" }, { "model": "android", "scope": "eq", "trust": 0.8, "vendor": "google", "version": "5.1.1 lmy49h" }, { "model": "android", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "5.x" }, { "model": "android", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "2016-03-01 earlier 6.x" }, { "model": "android", "scope": "eq", "trust": 0.8, "vendor": "google", "version": "4.4.4" }, { "model": "android", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "4.x" }, { "model": "nexus lmy49h", "scope": "lt", "trust": 0.6, "vendor": "google", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "CNNVD", "id": "CNNVD-201603-092" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:google:android", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001810" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gentoo", "sources": [ { "db": "PACKETSTORM", "id": "136204" } ], "trust": 0.1 }, "cve": "CVE-2016-1621", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2016-1621", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-01543", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-1621", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1621", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-1621", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-01543", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201603-092", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2016-1621", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "CNNVD", "id": "CNNVD-201603-092" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in mediaservers prior to GoogleNexusBuildsLMY49H. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201603-09\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Chromium: Multiple vulnerabilities\n Date: March 12, 2016\n Bugs: #555640, #559384, #561448, #563098, #565510, #567308,\n #567870, #568396, #572542, #574416, #575434, #576354, #576858\n ID: 201603-09\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in the Chromium web browser,\nthe worst of which allows remote attackers to execute arbitrary code. \n\nBackground\n==========\n\nChromium is an open-source browser project that aims to build a safer,\nfaster, and more stable way for all users to experience the web. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/chromium \u003c 49.0.2623.87 \u003e= 49.0.2623.87\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in the Chromium web\nbrowser. Please review the CVE identifiers referenced below for\ndetails. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Chromium users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-client/chromium-49.0.2623.87\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-1270\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270\n[ 2 ] CVE-2015-1271\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271\n[ 3 ] CVE-2015-1272\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272\n[ 4 ] CVE-2015-1273\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273\n[ 5 ] CVE-2015-1274\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274\n[ 6 ] CVE-2015-1275\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275\n[ 7 ] CVE-2015-1276\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276\n[ 8 ] CVE-2015-1277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277\n[ 9 ] CVE-2015-1278\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278\n[ 10 ] CVE-2015-1279\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279\n[ 11 ] CVE-2015-1280\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280\n[ 12 ] CVE-2015-1281\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281\n[ 13 ] CVE-2015-1282\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282\n[ 14 ] CVE-2015-1283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283\n[ 15 ] CVE-2015-1284\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284\n[ 16 ] CVE-2015-1285\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285\n[ 17 ] CVE-2015-1286\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286\n[ 18 ] CVE-2015-1287\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287\n[ 19 ] CVE-2015-1288\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288\n[ 20 ] CVE-2015-1289\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289\n[ 21 ] CVE-2015-1291\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291\n[ 22 ] CVE-2015-1292\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292\n[ 23 ] CVE-2015-1293\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293\n[ 24 ] CVE-2015-1294\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294\n[ 25 ] CVE-2015-1295\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295\n[ 26 ] CVE-2015-1296\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296\n[ 27 ] CVE-2015-1297\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297\n[ 28 ] CVE-2015-1298\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298\n[ 29 ] CVE-2015-1299\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299\n[ 30 ] CVE-2015-1300\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300\n[ 31 ] CVE-2015-1302\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302\n[ 32 ] CVE-2015-1303\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303\n[ 33 ] CVE-2015-1304\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304\n[ 34 ] CVE-2015-6755\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755\n[ 35 ] CVE-2015-6756\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756\n[ 36 ] CVE-2015-6757\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757\n[ 37 ] CVE-2015-6758\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758\n[ 38 ] CVE-2015-6759\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759\n[ 39 ] CVE-2015-6760\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760\n[ 40 ] CVE-2015-6761\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761\n[ 41 ] CVE-2015-6762\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762\n[ 42 ] CVE-2015-6763\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763\n[ 43 ] CVE-2015-6764\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764\n[ 44 ] CVE-2015-6765\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765\n[ 45 ] CVE-2015-6766\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766\n[ 46 ] CVE-2015-6767\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767\n[ 47 ] CVE-2015-6768\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768\n[ 48 ] CVE-2015-6769\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769\n[ 49 ] CVE-2015-6770\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770\n[ 50 ] CVE-2015-6771\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771\n[ 51 ] CVE-2015-6772\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772\n[ 52 ] CVE-2015-6773\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773\n[ 53 ] CVE-2015-6774\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774\n[ 54 ] CVE-2015-6775\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775\n[ 55 ] CVE-2015-6776\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776\n[ 56 ] CVE-2015-6777\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777\n[ 57 ] CVE-2015-6778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778\n[ 58 ] CVE-2015-6779\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779\n[ 59 ] CVE-2015-6780\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780\n[ 60 ] CVE-2015-6781\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781\n[ 61 ] CVE-2015-6782\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782\n[ 62 ] CVE-2015-6783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783\n[ 63 ] CVE-2015-6784\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784\n[ 64 ] CVE-2015-6785\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785\n[ 65 ] CVE-2015-6786\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786\n[ 66 ] CVE-2015-6787\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787\n[ 67 ] CVE-2015-6788\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788\n[ 68 ] CVE-2015-6789\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789\n[ 69 ] CVE-2015-6790\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790\n[ 70 ] CVE-2015-6791\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791\n[ 71 ] CVE-2015-6792\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792\n[ 72 ] CVE-2015-8126\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126\n[ 73 ] CVE-2016-1612\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612\n[ 74 ] CVE-2016-1613\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613\n[ 75 ] CVE-2016-1614\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614\n[ 76 ] CVE-2016-1615\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615\n[ 77 ] CVE-2016-1616\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616\n[ 78 ] CVE-2016-1617\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617\n[ 79 ] CVE-2016-1618\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618\n[ 80 ] CVE-2016-1619\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619\n[ 81 ] CVE-2016-1620\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620\n[ 82 ] CVE-2016-1621\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621\n[ 83 ] CVE-2016-1622\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622\n[ 84 ] CVE-2016-1623\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623\n[ 85 ] CVE-2016-1624\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624\n[ 86 ] CVE-2016-1625\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625\n[ 87 ] CVE-2016-1626\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626\n[ 88 ] CVE-2016-1627\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627\n[ 89 ] CVE-2016-1628\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628\n[ 90 ] CVE-2016-1629\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629\n[ 91 ] CVE-2016-1630\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630\n[ 92 ] CVE-2016-1631\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631\n[ 93 ] CVE-2016-1632\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632\n[ 94 ] CVE-2016-1633\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633\n[ 95 ] CVE-2016-1634\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634\n[ 96 ] CVE-2016-1635\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635\n[ 97 ] CVE-2016-1636\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636\n[ 98 ] CVE-2016-1637\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637\n[ 99 ] CVE-2016-1638\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638\n[ 100 ] CVE-2016-1639\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639\n[ 101 ] CVE-2016-1640\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640\n[ 102 ] CVE-2016-1641\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201603-09\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "PACKETSTORM", "id": "136204" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1621", "trust": 3.2 }, { "db": "SECUNIA", "id": "69391", "trust": 1.2 }, { "db": "BID", "id": "84239", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-001810", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2016-01543", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201603-092", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2016-1621", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136204", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "PACKETSTORM", "id": "136204" }, { "db": "CNNVD", "id": "CNNVD-201603-092" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "id": "VAR-201603-0118", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" } ], "trust": 0.717751986 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" } ] }, "last_update_date": "2024-11-23T21:30:49.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DO NOT MERGE - Remove deprecated image defines", "trust": 0.8, "url": "https://android.googlesource.com/platform/frameworks/av/+/5a6788730acfc6fd8f4a6ef89d2c376572a26b55" }, { "title": "libwebm: Pull from upstream", "trust": 0.8, "url": "https://android.googlesource.com/platform/external/libvpx/+/04839626ed859623901ebd3a5fd483982186b59d" }, { "title": "Merge Conflict Fix CL to lmp-mr1-release for ag/849478", "trust": 0.8, "url": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426" }, { "title": "Nexus Security Bulletin - March 2016", "trust": 0.8, "url": "http://source.android.com/security/bulletin/2016-03-01.html" }, { "title": "GoogleNexusmediaserver memory corruption vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/72457" }, { "title": "Android mediaserver Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60452" }, { "title": "Red Hat: CVE-2016-1621", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-1621" }, { "title": "Android Security Bulletins: Nexus Security Bulletin - March 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=bdec4bc902496de72a50f4fbaa9a726a" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-fixes-critical-android-mediaserver-bugs-again/116614/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "CNNVD", "id": "CNNVD-201603-092" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://source.android.com/security/bulletin/2016-03-01.html" }, { "trust": 1.7, "url": "https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426" }, { "trust": 1.7, "url": "https://android.googlesource.com/platform/external/libvpx/+/04839626ed859623901ebd3a5fd483982186b59d" }, { "trust": 1.7, "url": "https://android.googlesource.com/platform/frameworks/av/+/5a6788730acfc6fd8f4a6ef89d2c376572a26b55" }, { "trust": 1.2, "url": "http://secunia.com/advisories/69391" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/84239" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201603-09" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-march/179128.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1621" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1621" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1621" }, { "trust": 0.1, "url": "https://threatpost.com/google-fixes-critical-android-mediaserver-bugs-again/116614/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1625" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1295" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6768" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1273" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1641" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6792" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6761" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1617" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1278" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1293" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6764" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1296" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6791" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1274" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6786" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1296" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1288" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1619" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6776" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1613" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6773" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1297" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1615" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1282" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1284" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6771" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1636" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1294" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1639" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1278" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1298" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1299" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6781" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1279" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1289" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1272" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6762" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6789" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6763" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6758" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1297" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1635" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1618" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8126" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1280" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1632" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1622" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1281" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1270" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1637" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1277" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1289" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1291" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1295" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1279" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1287" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1304" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1292" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1271" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1293" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6757" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6770" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1623" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6774" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1294" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1614" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1280" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6787" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6790" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1281" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6766" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1612" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1640" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1303" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6765" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1284" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6785" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6756" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1634" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6760" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1633" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1626" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6782" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6767" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6780" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1288" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1302" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1628" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6788" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1292" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1275" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1627" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6775" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1272" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1616" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1629" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6778" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6784" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6769" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1277" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1300" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6772" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1275" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1273" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6759" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6777" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1638" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1286" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1631" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1298" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6755" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1271" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1270" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1630" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1274" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6779" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "PACKETSTORM", "id": "136204" }, { "db": "CNNVD", "id": "CNNVD-201603-092" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01543" }, { "db": "VULMON", "id": "CVE-2016-1621" }, { "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "db": "PACKETSTORM", "id": "136204" }, { "db": "CNNVD", "id": "CNNVD-201603-092" }, { "db": "NVD", "id": "CVE-2016-1621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-01543" }, { "date": "2016-03-12T00:00:00", "db": "VULMON", "id": "CVE-2016-1621" }, { "date": "2016-03-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "date": "2016-03-14T14:51:21", "db": "PACKETSTORM", "id": "136204" }, { "date": "2016-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-092" }, { "date": "2016-03-12T21:59:17.823000", "db": "NVD", "id": "CVE-2016-1621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-01543" }, { "date": "2016-12-03T00:00:00", "db": "VULMON", "id": "CVE-2016-1621" }, { "date": "2016-03-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001810" }, { "date": "2016-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-092" }, { "date": "2024-11-21T02:46:45.233000", "db": "NVD", "id": "CVE-2016-1621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "136204" }, { "db": "CNNVD", "id": "CNNVD-201603-092" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Android Media server libvpx Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001810" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-092" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.