ID

VAR-200703-0012


CVE

CVE-2007-0714


TITLE

Apple Quicktime UDTA ATOM Integer Overflow Vulnerability

Trust: 0.9

sources: BID: 22844 // CNNVD: CNNVD-200703-168

DESCRIPTION

Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of forged size fields in user-defined data atoms (UDTA). By setting this field to an overly large value, an integer overflow occurs resulting in an exploitable heap overflow. Successful exploitation results in code execution under the context of the running user. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. These issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. QuickTime versions prior to 7.1.5 are vulnerable. ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-07-010.html March 7, 2007 -- CVE ID: CVE-2007-0714 -- Affected Vendor: Apple -- Affected Products: Quicktime Player 7.1 -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since May 23, 2006 by the pre-existing Digital Vaccine protection filter ID 4411. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://docs.info.apple.com/article.html?artnum=61798 -- Disclosure Timeline: 2006.05.23 - Pre-existing Digital Vaccine released to TippingPoint customers 2006.08.14 - Vulnerability reported to vendor 2007.03.07 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by an anonymous researcher. -- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Apple QuickTime udta ATOM Integer Overflow By Sowhat of Nevis Labs Date: 2007.03.06 http://www.nevisnetworks.com http://secway.org/advisory/AD20070306.txt http://secway.org/advisory/AD20060512.txt CVE: CVE-2007-0714 Vendor: Apple Inc. The CVE-2006-1460 does not patch the root cause of this vulnerability. The layout of a udta(user data atom) atom: Bytes _______________________ | User data atom | | Atom size | 4 | Type = 'udta' | 4 | | | User data list | | Atom size | 4 | Type = user data types| 4 | | ----------------------- By setting the value of the Atom size to a large value such as 0xFFFFFFFF, an insufficiently-sized heap block will be allocated, and resulting in a classic complete heap memory overwrite during the RtlAllocateHeap() function. Vendor Response: 2006.05.06 Vendor notified via product-security@apple.com 2006.05.07 Vendor responded 2006.05.09 Vendor ask for more information 2006.05.11 Vendor released QuickTime 7.1, the code path was influenced, but the root cause was not fixed. 2007.03.06 Vendor released the fixed version 2007.03.06 Advisory release Reference: 1. http://developer.apple.com/documentation/QuickTime/QTFF/index.html 2. http://docs.info.apple.com/article.html?artnum=305149 3. http://secway.org/advisory/AD20060512.txt -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"

Trust: 8.1

sources: NVD: CVE-2007-0714 // CERT/CC: VU#568689 // CERT/CC: VU#880561 // CERT/CC: VU#822481 // CERT/CC: VU#861817 // CERT/CC: VU#448745 // CERT/CC: VU#313225 // CERT/CC: VU#410993 // JVNDB: JVNDB-2007-000194 // ZDI: ZDI-07-010 // BID: 22827 // BID: 22844 // VULHUB: VHN-24076 // PACKETSTORM: 54955 // PACKETSTORM: 54935

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 5.6

vendor:applemodel:quicktimescope:lteversion:7.1.4

Trust: 1.8

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.1.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.0

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.1.5

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 0.6

sources: CERT/CC: VU#568689 // CERT/CC: VU#880561 // CERT/CC: VU#822481 // CERT/CC: VU#861817 // CERT/CC: VU#448745 // CERT/CC: VU#313225 // CERT/CC: VU#410993 // ZDI: ZDI-07-010 // BID: 22827 // BID: 22844 // JVNDB: JVNDB-2007-000194 // CNNVD: CNNVD-200703-168 // NVD: CVE-2007-0714

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0714
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#568689
value: 16.20

Trust: 0.8

CARNEGIE MELLON: VU#880561
value: 6.64

Trust: 0.8

CARNEGIE MELLON: VU#822481
value: 9.00

Trust: 0.8

CARNEGIE MELLON: VU#861817
value: 17.36

Trust: 0.8

CARNEGIE MELLON: VU#448745
value: 4.81

Trust: 0.8

CARNEGIE MELLON: VU#313225
value: 17.72

Trust: 0.8

CARNEGIE MELLON: VU#410993
value: 16.20

Trust: 0.8

NVD: CVE-2007-0714
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200703-168
value: CRITICAL

Trust: 0.6

VULHUB: VHN-24076
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0714
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24076
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#568689 // CERT/CC: VU#880561 // CERT/CC: VU#822481 // CERT/CC: VU#861817 // CERT/CC: VU#448745 // CERT/CC: VU#313225 // CERT/CC: VU#410993 // VULHUB: VHN-24076 // JVNDB: JVNDB-2007-000194 // CNNVD: CNNVD-200703-168 // NVD: CVE-2007-0714

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.1

sources: VULHUB: VHN-24076 // NVD: CVE-2007-0714

THREAT TYPE

network

Trust: 0.6

sources: BID: 22827 // BID: 22844

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 22827 // BID: 22844

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000194

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-24076

PATCH

title:QuickTime 7.1.5 for Macurl:http://www.apple.com/support/downloads/quicktime715formac.html

Trust: 0.8

title:QuickTime 7.1.5 for Windowsurl:http://www.apple.com/support/downloads/quicktime715forwindows.html

Trust: 0.8

title:QuickTime 7.1.5url:http://docs.info.apple.com/article.html?artnum=305149

Trust: 0.8

title:QuickTime 7.1.5url:http://docs.info.apple.com/article.html?artnum=305149-ja

Trust: 0.8

title:アップル - QuickTimeurl:http://www.apple.com/jp/quicktime/download/win.html

Trust: 0.8

title:QuickTime 7.1.5 for Windowsurl:http://www.apple.com/jp/ftp-info/reference/quicktime715forwindows.html

Trust: 0.8

title:QuickTime 7.1.5 for Macurl:http://www.apple.com/jp/ftp-info/reference/quicktime715formac.html

Trust: 0.8

title:Apple has issued an update to correct this vulnerability.url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.7

sources: ZDI: ZDI-07-010 // JVNDB: JVNDB-2007-000194

EXTERNAL IDS

db:BIDid:22827

Trust: 8.4

db:SECUNIAid:24359

Trust: 8.1

db:SECTRACKid:1017725

Trust: 7.3

db:AUSCERTid:AL-2007.0031

Trust: 5.6

db:NVDid:CVE-2007-0714

Trust: 4.0

db:CERT/CCid:VU#861817

Trust: 3.9

db:ZDIid:ZDI-07-010

Trust: 3.3

db:BIDid:22844

Trust: 2.8

db:USCERTid:TA07-065A

Trust: 2.8

db:VUPENid:ADV-2007-0825

Trust: 1.7

db:OSVDBid:33902

Trust: 1.7

db:XFid:32819

Trust: 1.4

db:CERT/CCid:VU#568689

Trust: 1.1

db:CERT/CCid:VU#880561

Trust: 1.1

db:CERT/CCid:VU#822481

Trust: 1.1

db:CERT/CCid:VU#448745

Trust: 1.1

db:CERT/CCid:VU#313225

Trust: 1.1

db:CERT/CCid:VU#410993

Trust: 1.1

db:BIDid:22843

Trust: 0.8

db:USCERTid:SA07-065A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000194

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-093

Trust: 0.7

db:CNNVDid:CNNVD-200703-168

Trust: 0.7

db:CERT/CCid:TA07-065A

Trust: 0.6

db:BUGTRAQid:20070307 ZDI-07-010: APPLE QUICKTIME UDTA PARSING HEAP OVERFLOW VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20070306 APPLE QUICKTIME UDTA ATOM INTEGER OVERFLOW

Trust: 0.6

db:APPLEid:APPLE-SA-2007-03-05

Trust: 0.6

db:FULLDISCid:20070306 APPLE QUICKTIME UDTA ATOM INTEGER OVERFLOW

Trust: 0.6

db:CERT/CCid:VU#642433

Trust: 0.3

db:PACKETSTORMid:54955

Trust: 0.2

db:PACKETSTORMid:54935

Trust: 0.2

db:VULHUBid:VHN-24076

Trust: 0.1

sources: CERT/CC: VU#568689 // CERT/CC: VU#880561 // CERT/CC: VU#822481 // CERT/CC: VU#861817 // CERT/CC: VU#448745 // CERT/CC: VU#313225 // CERT/CC: VU#410993 // ZDI: ZDI-07-010 // VULHUB: VHN-24076 // BID: 22827 // BID: 22844 // JVNDB: JVNDB-2007-000194 // PACKETSTORM: 54955 // PACKETSTORM: 54935 // CNNVD: CNNVD-200703-168 // NVD: CVE-2007-0714

REFERENCES

url:http://www.securityfocus.com/bid/22827

Trust: 8.1

url:http://docs.info.apple.com/article.html?artnum=305149

Trust: 7.7

url:http://secunia.com/advisories/24359/

Trust: 5.6

url:http://www.auscert.org.au/7356

Trust: 5.6

url:http://www.ciac.org/ciac/bulletins/r-171.shtml

Trust: 5.6

url:http://securitytracker.com/id?1017725

Trust: 4.8

url:http://www.kb.cert.org/vuls/id/861817

Trust: 3.1

url:http://www.apple.com/quicktime/download/

Trust: 3.0

url:http://www.us-cert.gov/cas/techalerts/ta07-065a.html

Trust: 2.8

url:http://secway.org/advisory/ad20070306.txt

Trust: 2.6

url:http://www.zerodayinitiative.com/advisories/zdi-07-010.html

Trust: 2.6

url:http://www.securityfocus.com/bid/22844

Trust: 2.5

url:http://www.securitytracker.com/id?1017725

Trust: 2.5

url:http://secunia.com/advisories/24359

Trust: 2.5

url:http://www.us-cert.gov/cas/tips/st04-010.html

Trust: 2.4

url:http://support.microsoft.com/default.aspx?scid=kb;en-us;q294676

Trust: 2.4

url:http://www.cert.org/tech_tips/before_you_plug_in.html

Trust: 2.4

url:http://www.mozilla.org/support/firefox/faq

Trust: 2.4

url:http://lists.apple.com/archives/security-announce/2007/mar/msg00000.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html

Trust: 1.7

url:http://osvdb.org/33902

Trust: 1.7

url:http://www.apple.com/itunes/

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/0825

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/32819

Trust: 1.4

url:http://www.securityfocus.com/archive/1/461999/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/462153/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0825

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32819

Trust: 1.1

url:http://developer.apple.com/documentation/quicktime/qtff/index.html

Trust: 0.9

url:http://secway.org/advisory/ad20060512.txt

Trust: 0.9

url:http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt

Trust: 0.8

url:http://en.wikipedia.org/wiki/.mov

Trust: 0.8

url:http://www.securityfocus.com/bid/22843

Trust: 0.8

url:http://en.wikipedia.org/wiki/musical_instrument_digital_interface

Trust: 0.8

url:http://developer.apple.com/documentation/quicktime/qtff/qtffchap2/chapter_3_section_2.html

Trust: 0.8

url:http://en.wikipedia.org/wiki/pict

Trust: 0.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=486

Trust: 0.8

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=46

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0714

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-065a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-065a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0714

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-065a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2007/20070306_153534.html

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/462153/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/461999/100/0/threaded

Trust: 0.6

url:msg://bugtraq/45ec9719.10206@idefense.com

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/313225

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/410993

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/448745

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/568689

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/642433

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/822481

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/880561

Trust: 0.3

url:/archive/1/461999

Trust: 0.3

url:/archive/1/462153

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0714

Trust: 0.2

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://secway.org

Trust: 0.1

url:http://www.nevisnetworks.com

Trust: 0.1

sources: CERT/CC: VU#568689 // CERT/CC: VU#880561 // CERT/CC: VU#822481 // CERT/CC: VU#861817 // CERT/CC: VU#448745 // CERT/CC: VU#313225 // CERT/CC: VU#410993 // ZDI: ZDI-07-010 // VULHUB: VHN-24076 // BID: 22827 // BID: 22844 // JVNDB: JVNDB-2007-000194 // PACKETSTORM: 54955 // PACKETSTORM: 54935 // CNNVD: CNNVD-200703-168 // NVD: CVE-2007-0714

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-07-010

SOURCES

db:CERT/CCid:VU#568689
db:CERT/CCid:VU#880561
db:CERT/CCid:VU#822481
db:CERT/CCid:VU#861817
db:CERT/CCid:VU#448745
db:CERT/CCid:VU#313225
db:CERT/CCid:VU#410993
db:ZDIid:ZDI-07-010
db:VULHUBid:VHN-24076
db:BIDid:22827
db:BIDid:22844
db:JVNDBid:JVNDB-2007-000194
db:PACKETSTORMid:54955
db:PACKETSTORMid:54935
db:CNNVDid:CNNVD-200703-168
db:NVDid:CVE-2007-0714

LAST UPDATE DATE

2024-11-23T20:50:54.784000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#568689date:2007-03-19T00:00:00
db:CERT/CCid:VU#880561date:2007-03-19T00:00:00
db:CERT/CCid:VU#822481date:2007-03-19T00:00:00
db:CERT/CCid:VU#861817date:2007-03-19T00:00:00
db:CERT/CCid:VU#448745date:2007-03-09T00:00:00
db:CERT/CCid:VU#313225date:2007-03-19T00:00:00
db:CERT/CCid:VU#410993date:2007-03-19T00:00:00
db:ZDIid:ZDI-07-010date:2007-03-07T00:00:00
db:VULHUBid:VHN-24076date:2018-10-30T00:00:00
db:BIDid:22827date:2007-03-06T21:05:00
db:BIDid:22844date:2007-03-07T20:05:00
db:JVNDBid:JVNDB-2007-000194date:2007-04-19T00:00:00
db:CNNVDid:CNNVD-200703-168date:2013-01-10T00:00:00
db:NVDid:CVE-2007-0714date:2024-11-21T00:26:33.820

SOURCES RELEASE DATE

db:CERT/CCid:VU#568689date:2007-03-06T00:00:00
db:CERT/CCid:VU#880561date:2007-03-06T00:00:00
db:CERT/CCid:VU#822481date:2007-03-06T00:00:00
db:CERT/CCid:VU#861817date:2007-03-06T00:00:00
db:CERT/CCid:VU#448745date:2007-03-06T00:00:00
db:CERT/CCid:VU#313225date:2007-03-06T00:00:00
db:CERT/CCid:VU#410993date:2007-03-06T00:00:00
db:ZDIid:ZDI-07-010date:2007-03-07T00:00:00
db:VULHUBid:VHN-24076date:2007-03-05T00:00:00
db:BIDid:22827date:2007-03-05T00:00:00
db:BIDid:22844date:2007-03-06T00:00:00
db:JVNDBid:JVNDB-2007-000194date:2007-04-19T00:00:00
db:PACKETSTORMid:54955date:2007-03-09T02:32:27
db:PACKETSTORMid:54935date:2007-03-08T23:35:46
db:CNNVDid:CNNVD-200703-168date:2007-03-05T00:00:00
db:NVDid:CVE-2007-0714date:2007-03-05T22:19:00