ID

VAR-200609-0313


CVE

CVE-2006-4386


TITLE

Apple QuickTime fails to properly handle SGI images

Trust: 0.8

sources: CERT/CC: VU#308204

DESCRIPTION

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie, a different issue than CVE-2006-4381. Apple QuickTime fails to properly handle SGI images. Apple From, as a countermeasure version Quicktime 7.1.3 Has been released.Arbitrary code or commands can be executed by a remote third party, DoS You can be attacked. Successful exploits may facilitate a remote compromise of affected computers. CVE: CVE-2006-4386 Orginal URL: http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt Software affected: Tested on QucikTime 7.1 (Windows version), with all newest add-ons. 0. DISCLAIMER Author takes no responsibility for any actions with provided informations or codes. The copyright for any material created by the author is reserved. Any duplication of codes or texts provided here in electronic or printed publications is not permitted without the author's agreement. I. II. The overflow occurs in the H.264 codec. Vulnerable code: 6825a28f 668b4806 mov cx,[eax+0x6] ; cx = controled by attacker 6825a293 660fb6d5 movzx dx,ch ; dx = 0x00XX (XX - controled by attacker) 6825a297 8af1 mov dh,cl ; dx = 0xXXXX (-//-) 6825a299 8bca mov ecx,edx ; ecx = edx 6825a29b 6681f90001 cmp cx,0x100 ; compare cx with 0x100 6825a2a0 7f3d jg QuickTimeH264!JVTCompComponentDispatch+0x917c (6825a2df) ; (*1*) 6825a2a2 0fbfd1 movsx edx,cx ; (*2*) 6825a2a5 8bca mov ecx,edx 6825a2a7 8bd9 mov ebx,ecx 6825a2a9 c1e902 shr ecx,0x2 6825a2ac 8d7008 lea esi,[eax+0x8] 6825a2af 8d7c2418 lea edi,[esp+0x18] 6825a2b3 f3a5 rep movsd ds:00fb8000=???????? *1 - JG jumps, takes care of the sign so in this case we have an security check for upper bounds, but when cx is a negative number this check is bypassed. No lower bounds checks were applied - bad. *2 - Due to the bypass of the point *1 EDX is now CX extended by sign (in this case its negative), EDX now looks like 0xFFFFXXXX, the integer is overflowed and rep movsd causes an memory corruption (obvious fact is that ECX is related to EDX). Debugger output: eax=00fb2028 ebx=ffffc9c9 ecx=3fffda7e edx=ffffc9c9 esi=00fb8000 edi=00141688 eip=6825a2b3 esp=0013b6a0 ebp=0013b8c4 iopl=0 nv up ei pl nz ac po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00010216 *** ERROR: Symbol file could not be found. Defaulted to export symbols for E:\Quicktime\QTSystem\QuickTimeH264.qtx - QuickTimeH264!JVTCompComponentDispatch+0x9150: 6825a2b3 f3a5 rep movsd ds:00fb8000=???????? es:00141688=00000000 The vulnerability may lead to remote code execution when specially crafted video file (MOV file) is being loaded. III. POC CODE Due to severity of this bug i will not release any proof of concept codes for this issue. IV. VENDOR RESPONSE Check: http://docs.info.apple.com/article.html?artnum=61798 . McAfee, Inc. QuickTime is used by the Mac OS X operating system and by the QuickTime media player for Microsoft Windows. Seven code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, FLC, FPX and SGI. Exploitation could lead to execution of arbitrary code. User interaction is required for an attack to succeed. The risk rating for these issues is medium. _________________________________________________ * Vulnerable Systems QuickTime 7.1.2 and below for Mac OS X QuickTime for Windows 7.1.2 and below _________________________________________________ * Vulnerability Information CVE-2006-4382 Two buffer overflow vulnerabilities are present in QuickTime MOV format support. CVE-2006-4384 On heap overflow vulnerability is present in QuickTime FLC format support. CVE-2006-4385 One buffer overflow vulnerability is present in QuickTime SGI format support. CVE-2006-4386 One buffer overflow vulnerability is present in QuickTime MOV H.264 format support. CVE-2006-4388 One buffer overflow vulnerability is present in QuickTime FlashPix (FPX) format support. CVE-2006-4389 One uninitialized memory access vulnerability is present in QuickTime FlashPix (FPX) format support. _________________________________________________ * Resolution Apple has included fixes for the QuickTime issues in QuickTime version 7.1.3 for Mac OS X and for Microsoft Windows. Further information is available at: http://docs.info.apple.com/article.html?artnum=304357 _________________________________________________ * Credits These vulnerabilities were discovered by Mike Price of McAfee Avert Labs. _________________________________________________ * Legal Notice Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee's customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. McAfee, Inc. and McAfee Avert Labs are registered Trademarks of McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Best regards, Dave Marcus, B.A., CCNA, MCSE Security Research and Communications Manager McAfee(r) Avert(r) Labs . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200803-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Win32 binary codecs: Multiple vulnerabilities Date: March 04, 2008 Bugs: #150288 ID: 200803-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in the Win32 codecs for Linux may result in the remote execution of arbitrary code. Background ========== Win32 binary codecs provide support for video and audio playback. Workaround ========== There is no known workaround at this time. Resolution ========== All Win32 binary codecs users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/win32codecs-20071007-r2" Note: Since no updated binary versions have been released, the Quicktime libraries have been removed from the package. Please use the free alternative Quicktime implementations within VLC, MPlayer or Xine for playback. References ========== [ 1 ] CVE-2006-4382 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4382 [ 2 ] CVE-2006-4384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384 [ 3 ] CVE-2006-4385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4385 [ 4 ] CVE-2006-4386 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4386 [ 5 ] CVE-2006-4388 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4388 [ 6 ] CVE-2006-4389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4389 [ 7 ] CVE-2007-4674 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674 [ 8 ] CVE-2007-6166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200803-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFHzc+AuhJ+ozIKI5gRAkBQAJ45BLSUrSDb21Ro/ZHEimwyzBpqqQCcD15e VpxOGmsa3V34PILWdYXqoXE= =70De -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 5.85

sources: NVD: CVE-2006-4386 // CERT/CC: VU#308204 // CERT/CC: VU#200316 // CERT/CC: VU#683700 // CERT/CC: VU#554252 // CERT/CC: VU#540348 // JVNDB: JVNDB-2006-000934 // BID: 19976 // VULHUB: VHN-20494 // PACKETSTORM: 49968 // PACKETSTORM: 50015 // PACKETSTORM: 64267

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 4.0

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:lteversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 0.6

vendor:gentoomodel:media-libs/win32codecs 20071007-r2scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.1.3

Trust: 0.3

sources: CERT/CC: VU#308204 // CERT/CC: VU#200316 // CERT/CC: VU#683700 // CERT/CC: VU#554252 // CERT/CC: VU#540348 // BID: 19976 // JVNDB: JVNDB-2006-000934 // CNNVD: CNNVD-200609-166 // NVD: CVE-2006-4386

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4386
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#308204
value: 27.00

Trust: 0.8

CARNEGIE MELLON: VU#200316
value: 0.08

Trust: 0.8

CARNEGIE MELLON: VU#683700
value: 2.73

Trust: 0.8

CARNEGIE MELLON: VU#554252
value: 27.00

Trust: 0.8

CARNEGIE MELLON: VU#540348
value: 27.00

Trust: 0.8

CNNVD: CNNVD-200609-166
value: MEDIUM

Trust: 0.6

VULHUB: VHN-20494
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-4386
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-20494
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#308204 // CERT/CC: VU#200316 // CERT/CC: VU#683700 // CERT/CC: VU#554252 // CERT/CC: VU#540348 // VULHUB: VHN-20494 // CNNVD: CNNVD-200609-166 // NVD: CVE-2006-4386

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4386

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 49968 // CNNVD: CNNVD-200609-166

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200609-166

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000934

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-20494

PATCH

title:HT1338url:http://support.apple.com/kb/HT1338?viewlocale=ja_JP

Trust: 0.8

title:TA24355url:http://support.apple.com/kb/TA24355?viewlocale=ja_JP

Trust: 0.8

title:HT1222url:http://support.apple.com/kb/HT1222?viewlocale=ja_JP

Trust: 0.8

title:QuickTime 7.1.3 Update のセキュリティコンテンツについてurl:http://www.apple.com/jp/ftp-info/reference/quicktime713.html

Trust: 0.8

title:QuickTime - ダウンロード QuickTime Player スタンドアロン版のダウンロードurl:http://www.apple.com/jp/quicktime/download/

Trust: 0.8

title:TA06-256Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta06-256a.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000934

EXTERNAL IDS

db:SECUNIAid:21893

Trust: 4.9

db:CERT/CCid:VU#554252

Trust: 3.6

db:USCERTid:TA06-256A

Trust: 3.3

db:NVDid:CVE-2006-4386

Trust: 3.1

db:BIDid:19976

Trust: 2.0

db:CERT/CCid:VU#308204

Trust: 1.9

db:CERT/CCid:VU#683700

Trust: 1.9

db:CERT/CCid:VU#540348

Trust: 1.9

db:SECTRACKid:1016830

Trust: 1.7

db:SECUNIAid:29182

Trust: 1.7

db:OSVDBid:28773

Trust: 1.7

db:VUPENid:ADV-2006-3577

Trust: 1.7

db:SREASONid:1550

Trust: 1.7

db:CERT/CCid:VU#200316

Trust: 1.1

db:JVNDBid:JVNDB-2006-000934

Trust: 0.8

db:BUGTRAQid:20060913 MULTIPLE VULNERABILITIES IN APPLE QUICKTIME

Trust: 0.6

db:BUGTRAQid:20060912 APPLE QUICKTIME PLAYER H.264 CODEC REMOTE INTEGER OVERFLOW

Trust: 0.6

db:CERT/CCid:TA06-256A

Trust: 0.6

db:XFid:28934

Trust: 0.6

db:APPLEid:APPLE-SA-2006-09-12

Trust: 0.6

db:GENTOOid:GLSA-200803-08

Trust: 0.6

db:CNNVDid:CNNVD-200609-166

Trust: 0.6

db:PACKETSTORMid:49968

Trust: 0.2

db:VULHUBid:VHN-20494

Trust: 0.1

db:PACKETSTORMid:50015

Trust: 0.1

db:PACKETSTORMid:64267

Trust: 0.1

sources: CERT/CC: VU#308204 // CERT/CC: VU#200316 // CERT/CC: VU#683700 // CERT/CC: VU#554252 // CERT/CC: VU#540348 // VULHUB: VHN-20494 // BID: 19976 // JVNDB: JVNDB-2006-000934 // PACKETSTORM: 49968 // PACKETSTORM: 50015 // PACKETSTORM: 64267 // CNNVD: CNNVD-200609-166 // NVD: CVE-2006-4386

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=304357

Trust: 5.0

url:http://www.us-cert.gov/cas/techalerts/ta06-256a.html

Trust: 3.3

url:http://secunia.com/advisories/21893/

Trust: 3.2

url:http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/554252

Trust: 2.8

url:http://www.apple.com/support/downloads/quicktime713.html

Trust: 2.4

url:http://www.apple.com/quicktime/download/standalone.html

Trust: 2.4

url:http://www.us-cert.gov/reading_room/securing_browser/

Trust: 2.4

url:http://security.gentoo.org/glsa/glsa-200803-08.xml

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2006/sep/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/19976

Trust: 1.7

url:http://www.osvdb.org/28773

Trust: 1.7

url:http://securitytracker.com/id?1016830

Trust: 1.7

url:http://secunia.com/advisories/21893

Trust: 1.7

url:http://secunia.com/advisories/29182

Trust: 1.7

url:http://securityreason.com/securityalert/1550

Trust: 1.7

url:http://www.securityfocus.com/archive/1/445823/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/445888/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3577

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28934

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/308204

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/540348

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/683700

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4386

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4385

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4389

Trust: 0.9

url:http://www.cert.org/tech_tips/before_you_plug_in.html

Trust: 0.8

url:http://www.apple.com/quicktime/download/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4382

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-256a/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4382

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4385

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4389

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4386

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2006/20060913_173644.html

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/445823/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/28934

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/445888/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3577

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/200316

Trust: 0.3

url:/archive/1/445830

Trust: 0.3

url:/archive/1/445831

Trust: 0.3

url:/archive/1/445888

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-4386

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-4382

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4385

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4384

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4389

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4388

Trust: 0.2

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.1

url:http://www.piotrbania.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4674

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4674

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6166

Trust: 0.1

url:http://bugs.gentoo.org.

Trust: 0.1

url:http://enigmail.mozdev.org

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6166

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4388

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4382

Trust: 0.1

sources: CERT/CC: VU#308204 // CERT/CC: VU#200316 // CERT/CC: VU#683700 // CERT/CC: VU#554252 // CERT/CC: VU#540348 // VULHUB: VHN-20494 // BID: 19976 // JVNDB: JVNDB-2006-000934 // PACKETSTORM: 49968 // PACKETSTORM: 50015 // PACKETSTORM: 64267 // CNNVD: CNNVD-200609-166 // NVD: CVE-2006-4386

CREDITS

Sowhat smaillist@gmail.com Mike PricePiotr Bania bania.piotr@gmail.com Ruben Santamarta ruben@reversemode.com

Trust: 0.6

sources: CNNVD: CNNVD-200609-166

SOURCES

db:CERT/CCid:VU#308204
db:CERT/CCid:VU#200316
db:CERT/CCid:VU#683700
db:CERT/CCid:VU#554252
db:CERT/CCid:VU#540348
db:VULHUBid:VHN-20494
db:BIDid:19976
db:JVNDBid:JVNDB-2006-000934
db:PACKETSTORMid:49968
db:PACKETSTORMid:50015
db:PACKETSTORMid:64267
db:CNNVDid:CNNVD-200609-166
db:NVDid:CVE-2006-4386

LAST UPDATE DATE

2024-09-19T21:18:28.066000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#308204date:2006-09-13T00:00:00
db:CERT/CCid:VU#200316date:2006-09-15T00:00:00
db:CERT/CCid:VU#683700date:2006-09-13T00:00:00
db:CERT/CCid:VU#554252date:2006-09-13T00:00:00
db:CERT/CCid:VU#540348date:2006-09-13T00:00:00
db:VULHUBid:VHN-20494date:2018-10-17T00:00:00
db:BIDid:19976date:2008-03-04T23:32:00
db:JVNDBid:JVNDB-2006-000934date:2009-04-03T00:00:00
db:CNNVDid:CNNVD-200609-166date:2006-09-14T00:00:00
db:NVDid:CVE-2006-4386date:2018-10-17T21:36:53.167

SOURCES RELEASE DATE

db:CERT/CCid:VU#308204date:2006-09-13T00:00:00
db:CERT/CCid:VU#200316date:2006-09-13T00:00:00
db:CERT/CCid:VU#683700date:2006-09-13T00:00:00
db:CERT/CCid:VU#554252date:2006-09-13T00:00:00
db:CERT/CCid:VU#540348date:2006-09-13T00:00:00
db:VULHUBid:VHN-20494date:2006-09-12T00:00:00
db:BIDid:19976date:2006-09-12T00:00:00
db:JVNDBid:JVNDB-2006-000934date:2009-04-03T00:00:00
db:PACKETSTORMid:49968date:2006-09-13T09:29:12
db:PACKETSTORMid:50015date:2006-09-14T07:22:52
db:PACKETSTORMid:64267date:2008-03-04T22:49:07
db:CNNVDid:CNNVD-200609-166date:2006-09-12T00:00:00
db:NVDid:CVE-2006-4386date:2006-09-12T23:07:00