ID

VAR-200703-0606


CVE

CVE-2007-1467


TITLE

plural Cisco Product PreSearch.html Cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-001703

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form. Multiple Cisco products are prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input. An attacker may leverage this issue by enticing a victim into following a maliciously crafted URI. Attackers may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco IDs: CSCsh91761, CSCsh52300, CSCsh91884, CSCsi12435, CSCsh91901, CSCsi10405, CSCsh91953, CSCsh93070, CSCsh93854, CSCek71039, CSCsh95009, CSCsi10818, CSCsi10674, CSCsi10982, CSCsi13743, CSCsi13763. A remote attacker can inject arbitrary web script or HTML with the help of a text field in search format. Input passed to the search code of PreSearch.html or PreSearch.class (depending on software or device) is not properly sanitised before being returned to the user. SOLUTION: If possible, the vendor recommends deleting or renaming the PreSearch.html and PreSearch.class files. PROVIDED AND/OR DISCOVERED BY: Independently discovered by Erwin Paternotte from Fox-IT and Cassio Goldschmidt. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sr-20070315-xss.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2007-1467 // JVNDB: JVNDB-2007-001703 // CNNVD: CNNVD-200703-426 // BID: 22982 // VULHUB: VHN-24829 // PACKETSTORM: 55116

AFFECTED PRODUCTS

vendor:ciscomodel:wan managerscope: - version: -

Trust: 1.7

vendor:ciscomodel:wireless control systemscope:eqversion:4.0

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.0.2c

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.0.2a

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.8.1

Trust: 1.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.5.2

Trust: 1.5

vendor:ciscomodel:call managerscope: - version: -

Trust: 1.4

vendor:ciscomodel:network analysis modulescope: - version: -

Trust: 1.4

vendor:ciscomodel:meetingplacescope: - version: -

Trust: 1.1

vendor:ciscomodel:ciscoworksscope: - version: -

Trust: 1.1

vendor:ciscomodel:security device managerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:meetingplacescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified video advantagescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified videoconferencingscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:ip communicatorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified videoconferencing managerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.5.1

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.5.4

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.6

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.5.2b

Trust: 1.0

vendor:ciscomodel:network analysis modulescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:wan managerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:wireless lan controllersscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.6.1

Trust: 1.0

vendor:ciscomodel:acs solution enginescope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:unified meetingplacescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:wireless lan solution enginescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified meetingplace expressscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.5.2

Trust: 1.0

vendor:ciscomodel:ciscoworksscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified personal communicatorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:wireless lan solution enginescope: - version: -

Trust: 0.9

vendor:ciscomodel:ip communicatorscope: - version: -

Trust: 0.8

vendor:ciscomodel:secure access control server solution enginescope: - version: -

Trust: 0.8

vendor:ciscomodel:unified meetingplacescope: - version: -

Trust: 0.8

vendor:ciscomodel:vpn clientscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless control systemscope: - version: -

Trust: 0.8

vendor:ciscomodel:ciscoworks wireless lan solution enginescope: - version: -

Trust: 0.8

vendor:ciscomodel:security device managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified meetingplace expressscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified personal communicatorscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified video advantagescope: - version: -

Trust: 0.8

vendor:ciscomodel:unified videoconferencingscope:eqversion:35xx product

Trust: 0.8

vendor:ciscomodel:unified videoconferencing managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controllersscope:eqversion:2006

Trust: 0.8

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.6

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.3

Trust: 0.6

vendor:ciscomodel:wireless lan controllersscope: - version: -

Trust: 0.6

vendor:ciscomodel:wireless control systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.7.0533

Trust: 0.3

vendor:ciscomodel:vpn client for windows cscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for windows ascope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:vpn client for windows bscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for windows cscope:eqversion:3.5.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.5.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.0.5

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.7

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:vpn client for solaris cscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for solaris ascope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for solarisscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:vpn client for solarisscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:vpn client for solarisscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:vpn client for solaris bscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for solarisscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for solarisscope:eqversion:3.5.1

Trust: 0.3

vendor:ciscomodel:vpn client for mac os cscope:eqversion:x4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for mac os ascope:eqversion:x4.0.2

Trust: 0.3

vendor:ciscomodel:vpn client for mac osscope:eqversion:x3.6.1

Trust: 0.3

vendor:ciscomodel:vpn client for mac osscope:eqversion:x3.6

Trust: 0.3

vendor:ciscomodel:vpn client for mac osscope:eqversion:x3.5.4

Trust: 0.3

vendor:ciscomodel:vpn client for mac os bscope:eqversion:x3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for mac osscope:eqversion:x3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for mac osscope:eqversion:x3.5.1

Trust: 0.3

vendor:ciscomodel:vpn client for linuxscope:eqversion:3.6.1

Trust: 0.3

vendor:ciscomodel:vpn client for linuxscope:eqversion:3.6

Trust: 0.3

vendor:ciscomodel:vpn client for linuxscope:eqversion:3.5.4

Trust: 0.3

vendor:ciscomodel:vpn client for linux bscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for linuxscope:eqversion:3.5.2

Trust: 0.3

vendor:ciscomodel:vpn client for linuxscope:eqversion:3.5.1

Trust: 0.3

vendor:ciscomodel:vpn clientscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30004.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30004.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.1.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.1.x

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.0.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.x

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.3

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.bscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.ascope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:unified videoconferencingscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified video advantagescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified personal communicatorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified meetingplace expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified meetingplacescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:security device managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:secure acs for windowsscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ip communicatorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks windows/wugscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks windowsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks windowsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks vpn/security management solutionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks monitoring center for securityscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:ciscoworks monitoring center for securityscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ciscoworks monitoring center for securityscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:ciscoworks monitoring center for securityscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:ciscoworks management center for ids sensorsscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:ciscoworks management center for ids sensorsscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ciscoworks management center for ids sensorsscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:ciscoworks management center for ids sensorsscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:ciscoworks management center for ids sensorsscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:ciscoworks lmsscope:eqversion:1.3

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks cd1 5th editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks cd1 4th editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks cd1 3rd editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks cd1 2nd editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks cd1 1st editionscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks access control list managerscope:eqversion:1.6

Trust: 0.3

vendor:ciscomodel:ciscoworks access control list managerscope:eqversion:1.5

Trust: 0.3

vendor:ciscomodel:ciscoworks wireless lan solution enginescope:eqversion:1105

Trust: 0.3

vendor:ciscomodel:ciscoworks hosting solution enginescope:eqversion:1105

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:20060

Trust: 0.3

sources: BID: 22982 // JVNDB: JVNDB-2007-001703 // CNNVD: CNNVD-200703-426 // NVD: CVE-2007-1467

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1467
value: LOW

Trust: 1.0

NVD: CVE-2007-1467
value: LOW

Trust: 0.8

CNNVD: CNNVD-200703-426
value: LOW

Trust: 0.6

VULHUB: VHN-24829
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2007-1467
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24829
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24829 // JVNDB: JVNDB-2007-001703 // CNNVD: CNNVD-200703-426 // NVD: CVE-2007-1467

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-1467

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200703-426

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 55116 // CNNVD: CNNVD-200703-426

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001703

PATCH

title:Document ID: 607url:http://www.cisco.com/en/US/products/csr/cisco-sr-20070315-xss.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001703

EXTERNAL IDS

db:NVDid:CVE-2007-1467

Trust: 2.8

db:BIDid:22982

Trust: 2.0

db:SECUNIAid:24499

Trust: 1.8

db:SECTRACKid:1017778

Trust: 1.7

db:SREASONid:2437

Trust: 1.7

db:VUPENid:ADV-2007-0973

Trust: 1.7

db:JVNDBid:JVNDB-2007-001703

Trust: 0.8

db:CNNVDid:CNNVD-200703-426

Trust: 0.7

db:BUGTRAQid:20070315 XSS VULNERABILITY IN THE ONLINE HELP SYSTEM OF SEVERAL CISCO PRODUCTS

Trust: 0.6

db:BUGTRAQid:20070315 RE: XSS VULNERABILITY IN THE ONLINE HELP SYSTEM OF SEVERAL CISCO PRODUCTS

Trust: 0.6

db:CISCOid:20070315 CROSS-SITE SCRIPTING VULNERABILITY IN ONLINE HELP SYSTEM

Trust: 0.6

db:XFid:33024

Trust: 0.6

db:VULHUBid:VHN-24829

Trust: 0.1

db:PACKETSTORMid:55116

Trust: 0.1

sources: VULHUB: VHN-24829 // BID: 22982 // JVNDB: JVNDB-2007-001703 // PACKETSTORM: 55116 // CNNVD: CNNVD-200703-426 // NVD: CVE-2007-1467

REFERENCES

url:http://www.securityfocus.com/bid/22982

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_response09186a0080803fe4.html

Trust: 1.7

url:http://www.securitytracker.com/id?1017778

Trust: 1.7

url:http://secunia.com/advisories/24499

Trust: 1.7

url:http://securityreason.com/securityalert/2437

Trust: 1.7

url:http://www.securityfocus.com/archive/1/462944/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/462932/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0973

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/33024

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1467

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1467

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/462944/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/462932/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/33024

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/0973

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sr-20070315-xss.shtml

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/462944

Trust: 0.3

url:http://secunia.com/product/13664/

Trust: 0.1

url:http://secunia.com/product/10635/

Trust: 0.1

url:http://secunia.com/product/6330/

Trust: 0.1

url:http://secunia.com/product/13676/

Trust: 0.1

url:http://secunia.com/product/5603/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/13660/

Trust: 0.1

url:http://secunia.com/product/11019/

Trust: 0.1

url:http://secunia.com/product/11848/

Trust: 0.1

url:http://secunia.com/product/5604/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/2272/

Trust: 0.1

url:http://secunia.com/product/6025/

Trust: 0.1

url:http://secunia.com/product/13663/

Trust: 0.1

url:http://secunia.com/product/13675/

Trust: 0.1

url:http://secunia.com/product/13661/

Trust: 0.1

url:http://secunia.com/product/2267/

Trust: 0.1

url:http://secunia.com/product/13665/

Trust: 0.1

url:http://secunia.com/product/13672/

Trust: 0.1

url:http://secunia.com/product/123/

Trust: 0.1

url:http://secunia.com/product/5363/

Trust: 0.1

url:http://secunia.com/product/13658/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/13666/

Trust: 0.1

url:http://secunia.com/product/11850/

Trust: 0.1

url:http://secunia.com/product/2805/

Trust: 0.1

url:http://secunia.com/advisories/24499/

Trust: 0.1

url:http://secunia.com/product/13667/

Trust: 0.1

url:http://secunia.com/product/13673/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/product/13668/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/259/

Trust: 0.1

url:http://secunia.com/product/12534/

Trust: 0.1

url:http://secunia.com/product/11849/

Trust: 0.1

url:http://secunia.com/disassembling_og_reversing/

Trust: 0.1

url:http://secunia.com/product/12535/

Trust: 0.1

url:http://secunia.com/product/13671/

Trust: 0.1

url:http://secunia.com/product/2266/

Trust: 0.1

url:http://secunia.com/product/13662/

Trust: 0.1

url:http://secunia.com/product/6035/

Trust: 0.1

url:http://secunia.com/product/13674/

Trust: 0.1

sources: VULHUB: VHN-24829 // BID: 22982 // JVNDB: JVNDB-2007-001703 // PACKETSTORM: 55116 // CNNVD: CNNVD-200703-426 // NVD: CVE-2007-1467

CREDITS

Erwin Paternotte from Fox-IT and Cassio Goldschmidt are credited with the discovery of this issue.

Trust: 0.9

sources: BID: 22982 // CNNVD: CNNVD-200703-426

SOURCES

db:VULHUBid:VHN-24829
db:BIDid:22982
db:JVNDBid:JVNDB-2007-001703
db:PACKETSTORMid:55116
db:CNNVDid:CNNVD-200703-426
db:NVDid:CVE-2007-1467

LAST UPDATE DATE

2024-11-23T23:00:20.777000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24829date:2018-10-16T00:00:00
db:BIDid:22982date:2015-05-12T19:33:00
db:JVNDBid:JVNDB-2007-001703date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200703-426date:2007-03-22T00:00:00
db:NVDid:CVE-2007-1467date:2024-11-21T00:28:22.977

SOURCES RELEASE DATE

db:VULHUBid:VHN-24829date:2007-03-16T00:00:00
db:BIDid:22982date:2007-03-15T00:00:00
db:JVNDBid:JVNDB-2007-001703date:2012-06-26T00:00:00
db:PACKETSTORMid:55116date:2007-03-17T02:22:27
db:CNNVDid:CNNVD-200703-426date:2007-03-16T00:00:00
db:NVDid:CVE-2007-1467date:2007-03-16T21:19:00