Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:8368
[Eng]
Version
8
Class
patch
ALTXid
74857
Language
Russian
Severity
Critical
Title
Обновление SUSE-SU-2015:1086-4 -- устранение уязвимостей в java-1_7_0-ibm
Description
IBM Java 1.7.0 was updated to SR9 fixing security issues and bugs.
Family
unix
Platform
SUSE Linux Enterprise Server 11
Product
java-1_7_0-ibm
Reference
VENDOR: SUSE-SU-2015:1086-4
VENDOR: SUSE-SU-2015:1086-4
Id:
SUSE-SU-2015:1086-4
Reference:
https://www.suse.com/support/update/announcement/2015/suse-su-20151086-4.html
CVE: CVE-2015-0192
CVE: CVE-2015-0192
Id:
CVE-2015-0192
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0192
Comment
: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
SUSE-SU-2015:1073 (SUSE)
SUSE-SU-2015:1085 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1161 (SUSE)
RHSA-2015:1006 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1091 (REDHAT)
IV70682 (AIXAPAR)
IV70683 (AIXAPAR)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
CVE: CVE-2015-2808
CVE: CVE-2015-2808
Id:
CVE-2015-2808
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
Comment
: The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE:
327 (Use of a Broken or Risky Cryptographic Algorithm)
References:
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf (MISC)
IV71888 (AIXAPAR)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
IV71892 (AIXAPAR)
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html (CONFIRM)
SSRT102133 (HP)
HPSBGN03367 (HP)
HPSBMU03377 (HP)
SSRT102127 (HP)
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/hw-454055 (CONFIRM)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html (CONFIRM)
91787 (BID)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 (CONFIRM)
HPSBGN03399 (HP)
HPSBGN03402 (HP)
HPSBUX03512 (HP)
HPSBGN03407 (HP)
HPSBGN03354 (HP)
HPSBMU03345 (HP)
HPSBGN03414 (HP)
HPSBGN03415 (HP)
HPSBGN03403 (HP)
HPSBGN03338 (HP)
HPSBMU03401 (HP)
HPSBGN03405 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 (CONFIRM)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10163 (CONFIRM)
1032599 (SECTRACK)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 (CONFIRM)
SUSE-SU-2015:2166 (SUSE)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 (CONFIRM)
GLSA-201512-10 (GENTOO)
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm (CONFIRM)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2016:0113 (SUSE)
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 (CONFIRM)
1033769 (SECTRACK)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 (CONFIRM)
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 (CONFIRM)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 (CONFIRM)
1033737 (SECTRACK)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 (CONFIRM)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 (CONFIRM)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 (CONFIRM)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 (CONFIRM)
1033432 (SECTRACK)
1033431 (SECTRACK)
1033415 (SECTRACK)
1033386 (SECTRACK)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 (CONFIRM)
USN-2706-1 (UBUNTU)
USN-2696-1 (UBUNTU)
DSA-3339 (DEBIAN)
RHSA-2015:1526 (REDHAT)
SUSE-SU-2015:1320 (SUSE)
SUSE-SU-2015:1319 (SUSE)
openSUSE-SU-2015:1289 (SUSE)
openSUSE-SU-2015:1288 (SUSE)
http://www-304.ibm.com/support/docview.wss?uid=swg21960769 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21960015 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21903565 (CONFIRM)
1032868 (SECTRACK)
1032858 (SECTRACK)
1032788 (SECTRACK)
1032734 (SECTRACK)
1032708 (SECTRACK)
1032707 (SECTRACK)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
SUSE-SU-2015:1073 (SUSE)
73684 (BID)
https://kb.juniper.net/JSA10783 (CONFIRM)
1036222 (SECTRACK)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 (CONFIRM)
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 (CONFIRM)
1033072 (SECTRACK)
1033071 (SECTRACK)
1032990 (SECTRACK)
1032910 (SECTRACK)
1032600 (SECTRACK)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
DSA-3316 (DEBIAN)
SSRT102073 (HP)
RHSA-2015:1243 (REDHAT)
RHSA-2015:1242 (REDHAT)
RHSA-2015:1241 (REDHAT)
RHSA-2015:1230 (REDHAT)
RHSA-2015:1229 (REDHAT)
RHSA-2015:1228 (REDHAT)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html (CONFIRM)
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/ (MISC)
CVE: CVE-2015-1914
CVE: CVE-2015-1914
Id:
CVE-2015-1914
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1914
Comment
: IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
SUSE-SU-2015:1073 (SUSE)
SUSE-SU-2015:1085 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1161 (SUSE)
RHSA-2015:1006 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1091 (REDHAT)
74645 (BID)
IV72245 (AIXAPAR)
IV72246 (AIXAPAR)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
CVE: CVE-2015-0138
CVE: CVE-2015-0138
Id:
CVE-2015-0138
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0138
Comment
: GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
310 (Cryptographic Issues)
References:
SUSE-SU-2015:1073 (SUSE)
SUSE-SU-2015:1085 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1161 (SUSE)
RHSA-2015:1006 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1091 (REDHAT)
http://www-01.ibm.com/support/docview.wss?uid=swg21698703 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
73326 (BID)
CVE: CVE-2015-0491
CVE: CVE-2015-0491
Id:
CVE-2015-0491
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
openSUSE-SU-2015:0774 (SUSE)
openSUSE-SU-2015:0773 (SUSE)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2016:0113 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
1032120 (SECTRACK)
74094 (BID)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
CVE: CVE-2015-0458
CVE: CVE-2015-0458
Id:
CVE-2015-0458
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458
Comment
: Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
CVSSv2 Score:
7.6
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
openSUSE-SU-2015:0774 (SUSE)
openSUSE-SU-2015:0773 (SUSE)
SUSE-SU-2015:0833 (SUSE)
74141 (BID)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
1032120 (SECTRACK)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
CVE: CVE-2015-0459
CVE: CVE-2015-0459
Id:
CVE-2015-0459
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
openSUSE-SU-2015:0774 (SUSE)
openSUSE-SU-2015:0773 (SUSE)
74083 (BID)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
1032120 (SECTRACK)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
CVE: CVE-2015-0469
CVE: CVE-2015-0469
Id:
CVE-2015-0469
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
RHSA-2015:0807 (REDHAT)
RHSA-2015:0809 (REDHAT)
RHSA-2015:0808 (REDHAT)
RHSA-2015:0806 (REDHAT)
DSA-3234 (DEBIAN)
openSUSE-SU-2015:0774 (SUSE)
MDVSA-2015:212 (MANDRIVA)
openSUSE-SU-2015:0773 (SUSE)
http://advisories.mageia.org/MGASA-2015-0158.html (CONFIRM)
DSA-3235 (DEBIAN)
SUSE-SU-2015:0833 (SUSE)
74072 (BID)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
USN-2574-1 (UBUNTU)
USN-2573-1 (UBUNTU)
1032120 (SECTRACK)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
DSA-3316 (DEBIAN)
CVE: CVE-2015-0480
CVE: CVE-2015-0480
Id:
CVE-2015-0480
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
RHSA-2015:0807 (REDHAT)
RHSA-2015:0809 (REDHAT)
RHSA-2015:0808 (REDHAT)
RHSA-2015:0806 (REDHAT)
DSA-3234 (DEBIAN)
openSUSE-SU-2015:0774 (SUSE)
MDVSA-2015:212 (MANDRIVA)
openSUSE-SU-2015:0773 (SUSE)
http://advisories.mageia.org/MGASA-2015-0158.html (CONFIRM)
DSA-3235 (DEBIAN)
74104 (BID)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
USN-2574-1 (UBUNTU)
USN-2573-1 (UBUNTU)
1032120 (SECTRACK)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
DSA-3316 (DEBIAN)
CVE: CVE-2015-0488
CVE: CVE-2015-0488
Id:
CVE-2015-0488
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
RHSA-2015:0807 (REDHAT)
RHSA-2015:0809 (REDHAT)
RHSA-2015:0808 (REDHAT)
RHSA-2015:0806 (REDHAT)
DSA-3234 (DEBIAN)
openSUSE-SU-2015:0774 (SUSE)
MDVSA-2015:212 (MANDRIVA)
openSUSE-SU-2015:0773 (SUSE)
http://advisories.mageia.org/MGASA-2015-0158.html (CONFIRM)
DSA-3235 (DEBIAN)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
http://www-304.ibm.com/support/docview.wss?uid=swg21960769 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21960194 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21903565 (CONFIRM)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
USN-2574-1 (UBUNTU)
USN-2573-1 (UBUNTU)
1032120 (SECTRACK)
74111 (BID)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
DSA-3316 (DEBIAN)
CVE: CVE-2015-0478
CVE: CVE-2015-0478
Id:
CVE-2015-0478
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
RHSA-2015:0807 (REDHAT)
RHSA-2015:0809 (REDHAT)
RHSA-2015:0808 (REDHAT)
RHSA-2015:0806 (REDHAT)
DSA-3234 (DEBIAN)
openSUSE-SU-2015:0774 (SUSE)
MDVSA-2015:212 (MANDRIVA)
openSUSE-SU-2015:0773 (SUSE)
http://advisories.mageia.org/MGASA-2015-0158.html (CONFIRM)
DSA-3235 (DEBIAN)
74147 (BID)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
1035517 (SECTRACK)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
http://www-304.ibm.com/support/docview.wss?uid=swg21960194 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21903565 (CONFIRM)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
USN-2574-1 (UBUNTU)
USN-2573-1 (UBUNTU)
1032120 (SECTRACK)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
DSA-3316 (DEBIAN)
CVE: CVE-2015-0477
CVE: CVE-2015-0477
Id:
CVE-2015-0477
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
Comment
: Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
RHSA-2015:0807 (REDHAT)
RHSA-2015:0809 (REDHAT)
RHSA-2015:0808 (REDHAT)
RHSA-2015:0806 (REDHAT)
DSA-3234 (DEBIAN)
openSUSE-SU-2015:0774 (SUSE)
MDVSA-2015:212 (MANDRIVA)
openSUSE-SU-2015:0773 (SUSE)
http://advisories.mageia.org/MGASA-2015-0158.html (CONFIRM)
DSA-3235 (DEBIAN)
SUSE-SU-2015:0833 (SUSE)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
GLSA-201603-11 (GENTOO)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
RHSA-2015:1091 (REDHAT)
RHSA-2015:1021 (REDHAT)
RHSA-2015:1020 (REDHAT)
RHSA-2015:1007 (REDHAT)
RHSA-2015:1006 (REDHAT)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1085 (SUSE)
USN-2574-1 (UBUNTU)
USN-2573-1 (UBUNTU)
1032120 (SECTRACK)
74119 (BID)
RHSA-2015:0858 (REDHAT)
RHSA-2015:0857 (REDHAT)
RHSA-2015:0854 (REDHAT)
DSA-3316 (DEBIAN)
CVE: CVE-2015-0204
CVE: CVE-2015-0204
Id:
CVE-2015-0204
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
Comment
: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
310 (Cryptographic Issues)
References:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679 (CONFIRM)
APPLE-SA-2015-04-08-2 (APPLE)
openSUSE-SU-2015:0130 (SUSE)
SUSE-SU-2015:0578 (SUSE)
SUSE-SU-2015:0946 (SUSE)
SUSE-SU-2015:1085 (SUSE)
SUSE-SU-2015:1086 (SUSE)
SUSE-SU-2015:1138 (SUSE)
SUSE-SU-2015:1161 (SUSE)
SUSE-SU-2015:2166 (SUSE)
SUSE-SU-2015:2168 (SUSE)
SUSE-SU-2015:2182 (SUSE)
SUSE-SU-2015:2192 (SUSE)
SUSE-SU-2015:2216 (SUSE)
SUSE-SU-2016:0113 (SUSE)
openSUSE-SU-2016:0640 (SUSE)
HPSBUX03162 (HP)
HPSBUX03244 (HP)
HPSBGN03299 (HP)
HPSBHF03289 (HP)
HPSBOV03318 (HP)
HPSBUX03334 (HP)
HPSBMU03380 (HP)
HPSBMU03345 (HP)
HPSBMU03409 (HP)
HPSBMU03396 (HP)
HPSBMU03413 (HP)
HPSBMU03397 (HP)
RHSA-2015:0066 (REDHAT)
RHSA-2015:0800 (REDHAT)
RHSA-2015:0849 (REDHAT)
RHSA-2016:1650 (REDHAT)
http://support.novell.com/security/cve/CVE-2015-0204.html (CONFIRM)
20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products (CISCO)
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 (CONFIRM)
http://www-304.ibm.com/support/docview.wss?uid=swg21960769 (CONFIRM)
DSA-3125 (DEBIAN)
MDVSA-2015:019 (MANDRIVA)
MDVSA-2015:062 (MANDRIVA)
MDVSA-2015:063 (MANDRIVA)
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html (CONFIRM)
71936 (BID)
91787 (BID)
1033378 (SECTRACK)
https://bto.bluecoat.com/security-advisory/sa88 (CONFIRM)
https://bto.bluecoat.com/security-advisory/sa91 (CONFIRM)
openssl-cve20150204-weak-security(99707) (XF)
https://freakattack.com/ (MISC)
https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0 (CONFIRM)
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10102 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10108 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10110 (CONFIRM)
GLSA-201503-11 (GENTOO)
https://support.apple.com/HT204659 (CONFIRM)
https://support.citrix.com/article/CTX216642 (CONFIRM)
https://www.openssl.org/news/secadv_20150108.txt (CONFIRM)
https://www.openssl.org/news/secadv_20150319.txt (CONFIRM)
Content available only for registered users!
ovaldb@altx-soft.com