Oval Definition:oval:com.ubuntu.xenial:def:201267020000000
Revision Date:2016-06-16Version:1
Title:CVE-2012-6702 on Ubuntu 16.04 LTS (xenial) - medium.
Description:Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2012-6702
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • apache2: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR apr-util: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR cmake: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR expat package in xenial was vulnerable but has been fixed (note: '2.1.0-7ubuntu0.16.04.2').
  • OR ghostscript: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR insighttoolkit package in xenial is affected and needs fixing.
  • OR smart: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR texlive-bin: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'code-not-compiled').
  • OR tla package in xenial, is related to the CVE in some way and has been fixed (note: '1.3.5+dfsg-15').
  • OR vnc4: while related to the CVE in some way, a decision has been made to ignore this issue.
  • OR xmlrpc-c package in xenial is affected and needs fixing.
  • BACK