ID

VAR-200609-0268


CVE

CVE-2006-4802


TITLE

Symantec AntiVirus Corporate Edition Such as Real Time Virus Scan Format string vulnerability in service

Trust: 0.8

sources: JVNDB: JVNDB-2006-003176

DESCRIPTION

Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allows local users to execute arbitrary code via an unspecified vector related to alert notification messages, a different vector than CVE-2006-3454, a "second format string vulnerability" as found by the vendor. Symantec AntiVirus Corporate Edition is prone to multiple format-string vulnerabilities because it fails to properly sanitize user-supplied input before using it in the format-specifier argument to a formatted-printing function. Successfully exploiting these vulnerabilities may allow an attacker to execute arbitrary machine code with SYSTEM-level privileges. Attackers may also crash the Real Time Virus Scan service. Symantec AntiVirus is a very popular antivirus solution. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. 2) Another format string error exists in the alert notification process when displaying a notification message upon detection of a malicious file. SOLUTION: Apply patches (see patch matrix in vendor advisory). PROVIDED AND/OR DISCOVERED BY: 1) David Heiland, Layered Defense. 2) Reported by the vendor ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.09.13.html Layered Defense: http://layereddefense.com/SAV13SEPT.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1216-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 20th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : flexbackup Vulnerability : insecure temporary file Problem-Type : local Debian-specific: no CVE ID : CVE-2006-4802 Debian Bug : 334350 Eric Romang discovered that the flexbackup backup tool creates temporary files in an insecure manner, which allows denial of service through a symlink attack. For the stable distribution (sarge) this problem has been fixed in version 1.2.1-2sarge1 For the upcoming stable distribution (etch) this problem has been fixed in version 1.2.1-3. For the unstable distribution (sid) this problem has been fixed in version 1.2.1-3. We recommend that you upgrade your flexbackup package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1.dsc Size/MD5 checksum: 587 06539319d0534272e216306562677723 http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1.diff.gz Size/MD5 checksum: 3546 3365f545bd49464f4e58bacc503f8b28 http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1.orig.tar.gz Size/MD5 checksum: 80158 4955c89dbee354248f354a9bf0a480dd Architecture independent components: http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1_all.deb Size/MD5 checksum: 75836 240f8792a65a0d80b8ef85d4343a4827 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFYhMIXm3vHE4uyloRAjjTAKDCnxcy1cKXf1yBEbVCIyc3JANyMQCgz8JD pz5K4X1ok9uom1/tmGPBFoU= =WJOD -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2006-4802 // JVNDB: JVNDB-2006-003176 // BID: 19986 // VULHUB: VHN-20910 // VULMON: CVE-2006-4802 // PACKETSTORM: 50042 // PACKETSTORM: 52385

AFFECTED PRODUCTS

vendor:symantecmodel:client securityscope:eqversion:1.1

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:1.0.1

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:1.0

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.446

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.457

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.471

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.437

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.434

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.464

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:1.0.1_build_8.01.460

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:2.0

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:1.1.1

Trust: 1.3

vendor:symantecmodel:norton antivirusscope:eqversion:8.1.1.323

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:8.1.1.319

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.6

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:2.0.4

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:2.0.1

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:8.1

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.2

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.4

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.9

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.1.1_mr2_build_8.1.1.319

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1000

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.1.1_mr5_build_8.1.1.336

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.7

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.4

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.3

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.5

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.1.1_mr3_build_8.1.1.323

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:2.0.2

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1.1000

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.1.1_mr4_build_8.1.1.329

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.8

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:8.1.1_build8.1.1.314a

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.1.1_mr1_build_8.1.1.314a

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.2

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:8.1.1.329

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:2.0.3

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:1.x to 3.0

Trust: 0.8

vendor:symantecmodel:norton antivirusscope:eqversion:corporate edition 8.1 to 10.0

Trust: 0.8

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2011

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2010

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2002

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2001

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2000

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0

Trust: 0.3

vendor:symantecmodel:client security mr3 b9.0.3.1000scope:eqversion:2.0.3

Trust: 0.3

vendor:symantecmodel:client security mr2 b9.0.2.1000scope:eqversion:2.0.2

Trust: 0.3

vendor:symantecmodel:client security mr1 b9.0.1.1000scope:eqversion:2.0.1

Trust: 0.3

vendor:symantecmodel:client security stm buildscope:eqversion:2.09.0.0.338

Trust: 0.3

vendor:symantecmodel:client security (scfscope:eqversion:2.07.1)

Trust: 0.3

vendor:symantecmodel:client security mr5 buildscope:eqversion:1.1.18.1.1.336

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:eqversion:1.1.18.1.1.329

Trust: 0.3

vendor:symantecmodel:client security mr3 buildscope:eqversion:1.1.18.1.1.323

Trust: 0.3

vendor:symantecmodel:client security mr2 buildscope:eqversion:1.1.18.1.1.319

Trust: 0.3

vendor:symantecmodel:client security mr1 build 8.1.1.314ascope:eqversion:1.1.1

Trust: 0.3

vendor:symantecmodel:client security mr6 b8.1.1.266scope:eqversion:1.1.1

Trust: 0.3

vendor:symantecmodel:client security stm b8.1.0.825ascope:eqversion:1.1

Trust: 0.3

vendor:symantecmodel:client security mr8 buildscope:eqversion:1.0.18.01.471

Trust: 0.3

vendor:symantecmodel:client security mr7 buildscope:eqversion:1.0.18.01.464

Trust: 0.3

vendor:symantecmodel:client security mr6 buildscope:eqversion:1.0.18.01.460

Trust: 0.3

vendor:symantecmodel:client security mr5 buildscope:eqversion:1.0.18.01.457

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:eqversion:1.0.18.01.446

Trust: 0.3

vendor:symantecmodel:client security mr3 buildscope:eqversion:1.0.18.01.434

Trust: 0.3

vendor:symantecmodel:client security buildscope:eqversion:1.0.18.01.437

Trust: 0.3

vendor:symantecmodel:client security mr9 b8.01.501scope:eqversion:1.0.1

Trust: 0.3

vendor:symantecmodel:client security mr2 b8.01.429cscope:eqversion:1.0.1

Trust: 0.3

vendor:symantecmodel:client security mr1 b8.01.425a/bscope:eqversion:1.0.1

Trust: 0.3

vendor:symantecmodel:client security b8.01.9378scope:eqversion:1.0.0

Trust: 0.3

vendor:symantecmodel:client security b8.01.9374scope:eqversion:1.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2011

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2010

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2002

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2001

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.5

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.4

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.3.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.2.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.1.1.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.0.338

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.1.18.1.1.329

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.1.18.1.1.323

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.1.18.1.1.319

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition build 8.1.1.314ascope:eqversion:8.1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:8.1.1.377

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:8.1.1.366

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:8.1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.471

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.464

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.460

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.457

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.446

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.437

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:eqversion:8.18.01.434

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition .0.825ascope:eqversion:8.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:8.1

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.0.2.2020

Trust: 0.3

vendor:symantecmodel:client security buildscope:neversion:2.0.51100

Trust: 0.3

vendor:symantecmodel:client security buildscope:neversion:1.1.1393

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.0.2.2020

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.5.1100

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.1.1393

Trust: 0.3

sources: BID: 19986 // JVNDB: JVNDB-2006-003176 // CNNVD: CNNVD-200609-242 // NVD: CVE-2006-4802

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4802
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-4802
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200609-242
value: MEDIUM

Trust: 0.6

VULHUB: VHN-20910
value: MEDIUM

Trust: 0.1

VULMON: CVE-2006-4802
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-4802
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-20910
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-20910 // VULMON: CVE-2006-4802 // JVNDB: JVNDB-2006-003176 // CNNVD: CNNVD-200609-242 // NVD: CVE-2006-4802

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4802

THREAT TYPE

local

Trust: 1.0

sources: BID: 19986 // PACKETSTORM: 50042 // CNNVD: CNNVD-200609-242

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200609-242

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003176

PATCH

title:SYM06-017url:http://securityresponse.symantec.com/avcenter/security/Content/2006.09.13.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-003176

EXTERNAL IDS

db:NVDid:CVE-2006-4802

Trust: 3.0

db:BIDid:19986

Trust: 2.1

db:SECUNIAid:21884

Trust: 1.9

db:SECTRACKid:1016842

Trust: 1.8

db:JVNDBid:JVNDB-2006-003176

Trust: 0.8

db:CNNVDid:CNNVD-200609-242

Trust: 0.7

db:BUGTRAQid:20060918 SYMANTEC SECURITY ADVISORY: SYMANTEC ANTIVIRUS CORPORATE EDITION

Trust: 0.6

db:XFid:28937

Trust: 0.6

db:PACKETSTORMid:52385

Trust: 0.2

db:VULHUBid:VHN-20910

Trust: 0.1

db:VULMONid:CVE-2006-4802

Trust: 0.1

db:PACKETSTORMid:50042

Trust: 0.1

sources: VULHUB: VHN-20910 // VULMON: CVE-2006-4802 // BID: 19986 // JVNDB: JVNDB-2006-003176 // PACKETSTORM: 50042 // PACKETSTORM: 52385 // CNNVD: CNNVD-200609-242 // NVD: CVE-2006-4802

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2006.09.13.html

Trust: 2.2

url:http://www.securityfocus.com/bid/19986

Trust: 1.8

url:http://securitytracker.com/id?1016842

Trust: 1.8

url:http://secunia.com/advisories/21884

Trust: 1.8

url:http://www.securityfocus.com/archive/1/446293/100/0/threaded

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28937

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4802

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4802

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28937

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/446293/100/0/threaded

Trust: 0.6

url:http://www.symantec.com/products/enterprise?c=prodinfo&refid=805

Trust: 0.3

url:/archive/1/446041

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/product/3549/

Trust: 0.1

url:http://secunia.com/product/6649/

Trust: 0.1

url:http://secunia.com/product/3478/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/2344/

Trust: 0.1

url:http://secunia.com/product/5555/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/659/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://layereddefense.com/sav13sept.html

Trust: 0.1

url:http://secunia.com/advisories/21884/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1.dsc

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1-2sarge1.diff.gz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4802

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/f/flexbackup/flexbackup_1.2.1.orig.tar.gz

Trust: 0.1

sources: VULHUB: VHN-20910 // VULMON: CVE-2006-4802 // BID: 19986 // JVNDB: JVNDB-2006-003176 // PACKETSTORM: 50042 // PACKETSTORM: 52385 // CNNVD: CNNVD-200609-242 // NVD: CVE-2006-4802

CREDITS

Deral Heiland http://www.layereddefense.com/

Trust: 0.6

sources: CNNVD: CNNVD-200609-242

SOURCES

db:VULHUBid:VHN-20910
db:VULMONid:CVE-2006-4802
db:BIDid:19986
db:JVNDBid:JVNDB-2006-003176
db:PACKETSTORMid:50042
db:PACKETSTORMid:52385
db:CNNVDid:CNNVD-200609-242
db:NVDid:CVE-2006-4802

LAST UPDATE DATE

2024-08-14T14:47:53.681000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-20910date:2018-10-17T00:00:00
db:VULMONid:CVE-2006-4802date:2018-10-17T00:00:00
db:BIDid:19986date:2016-07-05T21:38:00
db:JVNDBid:JVNDB-2006-003176date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200609-242date:2006-09-18T00:00:00
db:NVDid:CVE-2006-4802date:2018-10-17T21:39:37.980

SOURCES RELEASE DATE

db:VULHUBid:VHN-20910date:2006-09-14T00:00:00
db:VULMONid:CVE-2006-4802date:2006-09-14T00:00:00
db:BIDid:19986date:2006-09-13T00:00:00
db:JVNDBid:JVNDB-2006-003176date:2012-12-20T00:00:00
db:PACKETSTORMid:50042date:2006-09-14T22:28:53
db:PACKETSTORMid:52385date:2006-11-21T07:18:54
db:CNNVDid:CNNVD-200609-242date:2006-09-14T00:00:00
db:NVDid:CVE-2006-4802date:2006-09-14T22:07:00