Skip to content

Commit

Permalink
PR1937 by Jan Cooper
Browse files Browse the repository at this point in the history
  • Loading branch information
JanCooper committed Mar 10, 2023
2 parents 9c30df8 + 0fcdd10 commit 6f1a1ad
Show file tree
Hide file tree
Showing 33 changed files with 393 additions and 0 deletions.
34 changes: 34 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1521.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1521" version="0" class="vulnerability">
<metadata>
<title>Multiple vulnerabilities on Adobe Media Encoder</title>
<affected family="windows">
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows Server 2008</platform>
<platform>Microsoft Windows Server 2008 R2</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<platform>Microsoft Windows Server 2016</platform>
<platform>Microsoft Windows Server 2019</platform>
<product>Adobe Media Encoder</product>
</affected>
<reference ref_id="APSB19-29" ref_url="https://helpx.adobe.com/security/products/media-encoder/apsb19-29.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2019-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7842" source="CVE"/>
<reference ref_id="CVE-2019-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7844" source="CVE"/>
<description>
Adobe Media Encoder version 13.0.2 has a use-after-free vulnerability (CVE-2019-7842) and an out-of-bounds read vulnerability (CVE-2019-7844). Successful exploitation could lead to remote code execution.
</description>
<oval_repository>
<dates>
<submitted date="2023-03-01T08:37:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria comment="Adobe Media Encoder is installed + version" operator="AND">
<extend_definition comment="Adobe Media Encoder is installed" definition_ref="oval:org.cisecurity:def:8776"/>
<criterion comment="Check if Adobe Media Encoder version is less than 13.1" test_ref="oval:com.gfi:tst:1522"/>
</criteria>
</definition>
41 changes: 41 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1524.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1524" version="0" class="vulnerability">
<metadata>
<title>Adobe InDesign versions 14.0.1 and below have an unsafe hyperlink processing vulnerability. (CVE-2019-7107)</title>
<affected family="windows">
<platform>Microsoft Windows 7</platform>
<platform>Microsoft Windows 8</platform>
<platform>Microsoft Windows 8.1</platform>
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows Server 2003</platform>
<platform>Microsoft Windows Server 2008</platform>
<platform>Microsoft Windows Server 2008 R2</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<product>Adobe InDesign</product>
</affected>
<reference ref_id="APSB19-23" ref_url="https://helpx.adobe.com/security/products/indesign/apsb19-23.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2019-7107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7107" source="CVE"/>
<description>
Adobe InDesign versions 14.0.1 and below have an unsafe hyperlink processing vulnerability. Successful exploitation could lead to arbitrary code execution. Fixed in versions 13.1.1 and 14.0.2. (CVE-2019-7107)
</description>
<oval_repository>
<dates>
<submitted date="2023-03-01T09:26:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria comment="Check for installation of vulnerable Adobe InDesign + vulnerable file version" operator="OR">
<criteria comment="Adobe InDesign is installed + version" operator="AND">
<extend_definition comment="Adobe InDesign is installed" definition_ref="oval:org.mitre.oval:def:12375"/>
<criterion comment="Check if Adobe InDesign version less than 14.0.2" test_ref="oval:com.gfi:tst:1525"/>
</criteria>
<criteria comment="Adobe InDesign is installed + version" operator="AND">
<extend_definition comment="Adobe InDesign is installed" definition_ref="oval:org.mitre.oval:def:12375"/>
<criterion comment="Check if Adobe InDesign version less than 13.1.1" test_ref="oval:com.gfi:tst:1527"/>
</criteria>
</criteria>
</definition>
42 changes: 42 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1529.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1529" version="0" class="vulnerability">
<metadata>
<title>
Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. (CVE-2019-7095)
</title>
<affected family="windows">
<platform>Microsoft Windows 2000</platform>
<platform>Microsoft Windows XP</platform>
<platform>Microsoft Windows Server 2003</platform>
<platform>Microsoft Windows Vista</platform>
<platform>Microsoft Windows Server 2008</platform>
<platform>Microsoft Windows Server 2008 R2</platform>
<platform>Microsoft Windows 7</platform>
<platform>Microsoft Windows 8</platform>
<platform>Microsoft Windows 8.1</platform>
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<platform>Microsoft Windows Server 2016</platform>
<platform>Microsoft Windows Server 2019</platform>
<product>Adobe Digital Editions</product>
</affected>
<reference ref_id="APSB19-16" ref_url="https://helpx.adobe.com/security/products/Digital-Editions/apsb19-16.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2019-7095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7095" source="CVE"/>
<description>
Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. (CVE-2019-7095)
</description>
<oval_repository>
<dates>
<submitted date="2023-03-01T10:45:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria comment="Adobe Digital Editions is installed + version" operator="AND">
<extend_definition comment="Adobe Digital Editions is installed" definition_ref="oval:org.mitre.oval:def:26684"/>
<criterion comment="Check if Adobe Digital Editions version is less than 4.5.10.186048" test_ref="oval:com.gfi:tst:1530"/>
</criteria>
</definition>
46 changes: 46 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1532.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1532" version="0" class="vulnerability">
<metadata>
<title>Multiple vulnerabilities on Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier)</title>
<affected family="windows">
<platform>Microsoft Windows 8</platform>
<platform>Microsoft Windows 8.1</platform>
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows 11</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<platform>Microsoft Windows Server 2016</platform>
<platform>Microsoft Windows Server 2019</platform>
<product>Adobe Bridge</product>
</affected>
<reference ref_id="APSB23-09" ref_url="https://helpx.adobe.com/security/products/bridge/apsb23-09.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2023-21583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21583" source="CVE"/>
<reference ref_id="CVE-2023-22226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22226" source="CVE"/>
<reference ref_id="CVE-2023-22227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22227" source="CVE"/>
<reference ref_id="CVE-2023-22228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22228" source="CVE"/>
<reference ref_id="CVE-2023-22229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22229" source="CVE"/>
<reference ref_id="CVE-2023-22230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22230" source="CVE"/>
<reference ref_id="CVE-2023-22231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22231" source="CVE"/>
<description>
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21583)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22226)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22227)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22228)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22229)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22230)
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-22231)
</description>
<oval_repository>
<dates>
<submitted date="2023-03-01T12:53:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria comment="Adobe Bridge is installed + version" operator="AND">
<extend_definition comment="Adobe Bridge is installed" definition_ref="oval:org.cisecurity:def:7159"/>
<criterion comment="Check if the version of Adobe Bridge is less than 12.0.4" test_ref="oval:com.gfi:tst:1533"/>
</criteria>
</definition>
51 changes: 51 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1535.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1535" version="0" class="vulnerability">
<metadata>
<title>Multiple vulnerabilites on Photoshop version 23.5.3 (and earlier), 24.1 (and earlier)</title>
<affected family="windows">
<platform>Microsoft Windows 8</platform>
<platform>Microsoft Windows 8.1</platform>
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows 11</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<platform>Microsoft Windows Server 2016</platform>
<platform>Microsoft Windows Server 2019</platform>
<product>Adobe Photoshop</product>
</affected>
<reference ref_id="APSB23-11" ref_url="https://helpx.adobe.com/security/products/photoshop/apsb23-11.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2023-21574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21574" source="CVE"/>
<reference ref_id="CVE-2023-21575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21575" source="CVE"/>
<reference ref_id="CVE-2023-21576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21576" source="CVE"/>
<reference ref_id="CVE-2023-21577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21577" source="CVE"/>
<reference ref_id="CVE-2023-21578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21578" source="CVE"/>
<description>
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21574)
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21575)
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21576)
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21577)
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21578)
</description>
<oval_repository>
<dates>
<submitted date="2023-03-01T14:43:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria operator="AND">
<extend_definition comment="Adobe Photoshop is installed" definition_ref="oval:org.mitre.oval:def:6647"/>
<criteria comment="vulnerable versions" operator="OR">
<criteria comment="Adobe Photoshop before 23.5.4" operator="AND">
<criterion comment="Check if the version of Adobe Photoshop is greater than or equal to 23.5" test_ref="oval:com.gfi:tst:1536"/>
<criterion comment="Check if the version of Adobe Photoshop is less than 23.5.4" test_ref="oval:com.gfi:tst:1538"/>
</criteria>
<criteria comment="Adobe Photoshop before 24.1.1" operator="AND">
<criterion comment="Check if the version of Adobe Photoshop is greater than or equal to 24.1" test_ref="oval:com.gfi:tst:1540"/>
<criterion comment="Check if the version of Adobe Photoshop is less than 24.1.1" test_ref="oval:com.gfi:tst:1542"/>
</criteria>
</criteria>
</criteria>
</definition>
44 changes: 44 additions & 0 deletions repository/definitions/vulnerability/oval_com.gfi_def_1544.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
<definition xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" id="oval:com.gfi:def:1544" version="0" class="vulnerability">
<metadata>
<title>Adobe InDesign versions ID18.1 (and earlier) and ID17.4 (and earlier) are affected by a NULL Pointer Dereference vulnerability. (CVE-2023-21593)</title>
<affected family="windows">
<platform>Microsoft Windows 7</platform>
<platform>Microsoft Windows 8</platform>
<platform>Microsoft Windows 8.1</platform>
<platform>Microsoft Windows 10</platform>
<platform>Microsoft Windows 11</platform>
<platform>Microsoft Windows Server 2003</platform>
<platform>Microsoft Windows Server 2008</platform>
<platform>Microsoft Windows Server 2008 R2</platform>
<platform>Microsoft Windows Server 2012</platform>
<platform>Microsoft Windows Server 2012 R2</platform>
<product>Adobe InDesign</product>
</affected>
<reference ref_id="APSB23-12" ref_url="https://helpx.adobe.com/security/products/indesign/apsb23-12.html" source="Vendor Advisory"/>
<reference ref_id="CVE-2023-21593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21593" source="CVE"/>
<description>
Adobe InDesign versions ID18.1 (and earlier) and ID17.4 (and earlier) are affected by a NULL Pointer Dereference vulnerability.
An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2023-21593)
</description>
<oval_repository>
<dates>
<submitted date="2023-03-02T01:20:00+00:00">
<contributor organization="GFI">Glenn Lugod</contributor>
</submitted>
</dates>
<status>INITIAL SUBMISSION</status>
<min_schema_version>5.10</min_schema_version>
</oval_repository>
</metadata>
<criteria comment="Check for installation of vulnerable Adobe InDesign + vulnerable file version" operator="OR">
<criteria comment="Adobe InDesign is installed + version" operator="AND">
<extend_definition comment="Adobe InDesign is installed" definition_ref="oval:org.mitre.oval:def:12375"/>
<criterion comment="Check if Adobe InDesign version less than ID18.2" test_ref="oval:com.gfi:tst:1545"/>
</criteria>
<criteria comment="Adobe InDesign is installed + version" operator="AND">
<extend_definition comment="Adobe InDesign is installed" definition_ref="oval:org.mitre.oval:def:12375"/>
<criterion comment="Check if Adobe InDesign version less than ID17.4.1" test_ref="oval:com.gfi:tst:1547"/>
</criteria>
</criteria>
</definition>
Loading

0 comments on commit 6f1a1ad

Please sign in to comment.