ID

VAR-200708-0097


CVE

CVE-2007-4216


TITLE

Check Point Zone Labs ZoneAlarm of vsdatant.sys Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2007-002472

DESCRIPTION

vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm before 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory locations. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. These issues have been confirmed in: ZoneAlarm 6.5.737 ZoneAlarm Security Suite 5.5.062.004 and 6.5.737. Other versions are likely vulnerable as well. NOTE: This BID is being retired because it is a duplicate of BID 25365 (Check Point Zone Labs Multiple Products Local Privilege Escalation Vulnerabilities). The following are vulnerable: - Versions prior to ZoneAlarm 7.0.362 - Zone Labs products that include 'vsdatant.sys' 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. There are multiple security vulnerabilities in the implementation and installation of ZoneAlarm, local attackers may use this vulnerability to elevate their own privileges. Since some programs run as system services, attackers can replace the installed ZoneAlarm files with their own code, which will then be executed with system-level privileges. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZoneAlarm Products Insecure Directory Permissions and IOCTL Handler Privilege Escalation SECUNIA ADVISORY ID: SA26513 VERIFY ADVISORY: http://secunia.com/advisories/26513/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: ZoneAlarm 6.x http://secunia.com/product/5806/ ZoneAlarm 7.x http://secunia.com/product/13889/ ZoneAlarm 5.x http://secunia.com/product/4647/ ZoneAlarm Pro 5.x http://secunia.com/product/4280/ ZoneAlarm Pro 6.x http://secunia.com/product/6071/ ZoneAlarm Security Suite 5.x http://secunia.com/product/4272/ ZoneAlarm 2.x http://secunia.com/product/3056/ ZoneAlarm 3.x http://secunia.com/product/153/ ZoneAlarm 4.x http://secunia.com/product/150/ ZoneAlarm Anti-Spyware 6.x http://secunia.com/product/6073/ ZoneAlarm Antivirus 5.x http://secunia.com/product/4271/ ZoneAlarm Antivirus 6.x http://secunia.com/product/6074/ ZoneAlarm Internet Security Suite 6.x http://secunia.com/product/6072/ ZoneAlarm Plus 3.x http://secunia.com/product/3057/ ZoneAlarm Plus 4.x http://secunia.com/product/151/ ZoneAlarm Pro 2.x http://secunia.com/product/152/ ZoneAlarm Pro 3.x http://secunia.com/product/1960/ ZoneAlarm Pro 4.x http://secunia.com/product/1961/ ZoneAlarm Wireless Security 5.x http://secunia.com/product/4648/ DESCRIPTION: Some vulnerabilities and a security issue have been reported in ZoneAlarm products, which can be exploited by malicious, local users to gain escalated privileges. 1) Insufficient address space verification within the 0x8400000F and 0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on the "\\.\vsdatant" device interface can be exploited to e.g. access the said IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges. 2) Insecure default Access Control List (ACL) settings when ZoneAlarm tools are installed can be exploited to gain escalated privileges by replacing certain files. SOLUTION: Update to version 7.0.362. 2) Discovered by an anonymous person and reported via iDefense Labs. ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585 Reversemode: http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . BACKGROUND Zone Alarm products provide security solutions such as anti-virus, firewall, spy-ware, and ad-ware protection. The vsdatant.sys driver, also known as the TrueVector Device Driver, is the core firewall driver in ZoneAlarm products. http://www.zonelabs.com/ II. The problems specifically exist within the IOCTL handling code in the vsdatant.sys device driver. The device driver fails to validate user-land supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013. Since the Irp parameters are not correctly validated, an attacker could utilize these IOCTLs to overwrite arbitrary memory with the constant double-word value of 0x60001 or the contents of a buffer returned from ZwQuerySystemInformation. This includes kernel memory as well as the code segments of running processes. III. The access control mechanisms under a default installation allow restricted accounts to access the affected device drivers. IV. V. WORKAROUND Changing the access control mechanisms for the affected device drivers will prevent exploitation by restricted accounts. VI. http://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-4216 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/19/2006 Initial vendor notification 12/20/2006 Initial vendor response 08/20/2007 Coordinated public disclosure IX. CREDIT These vulnerabilities were reported to iDefense by Ruben Santamarta of reversemode.com. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Trust: 2.43

sources: NVD: CVE-2007-4216 // JVNDB: JVNDB-2007-002472 // BID: 25377 // BID: 25365 // VULHUB: VHN-27578 // PACKETSTORM: 58746 // PACKETSTORM: 58736

AFFECTED PRODUCTS

vendor:checkpointmodel:zonealarmscope:eqversion:5.0.63.0

Trust: 1.6

vendor:checkpointmodel:zonealarmscope:eqversion:6.1.744.001

Trust: 1.6

vendor:checkpointmodel:zonealarmscope:lteversion:7.0.337.0

Trust: 1.0

vendor:check pointmodel:zonealarmscope:ltversion:7.0.362

Trust: 0.8

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.5.737

Trust: 0.6

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.62

Trust: 0.6

vendor:zonemodel:labs zonealarmscope:eqversion:6.5.737

Trust: 0.6

vendor:checkpointmodel:zonealarmscope:eqversion:7.0.337.0

Trust: 0.6

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.5.722

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.1.744.000

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.1.737

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm pro with web filteringscope:eqversion:4.5.594

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.0.590.015

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:7.0.302.000

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.5.737.000

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.1.744.001

Trust: 0.3

vendor:zonemodel:labs zonealarm plusscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarm plusscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarm internet security suitescope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows xpscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:951.0

Trust: 0.3

vendor:zonemodel:labs zonealarm antivirusscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm antivirusscope: - version: -

Trust: 0.3

vendor:zonemodel:labs zonealarm anti-spywarescope:eqversion:6.1

Trust: 0.3

vendor:zonemodel:labs zonealarm anti-spywarescope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.7.202

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.5

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.3

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.2

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:neversion:7.0.362

Trust: 0.3

sources: BID: 25377 // BID: 25365 // JVNDB: JVNDB-2007-002472 // CNNVD: CNNVD-200708-354 // NVD: CVE-2007-4216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4216
value: HIGH

Trust: 1.0

NVD: CVE-2007-4216
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200708-354
value: HIGH

Trust: 0.6

VULHUB: VHN-27578
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4216
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27578
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27578 // JVNDB: JVNDB-2007-002472 // CNNVD: CNNVD-200708-354 // NVD: CVE-2007-4216

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-27578 // JVNDB: JVNDB-2007-002472 // NVD: CVE-2007-4216

THREAT TYPE

local

Trust: 1.4

sources: BID: 25377 // BID: 25365 // PACKETSTORM: 58746 // PACKETSTORM: 58736 // CNNVD: CNNVD-200708-354

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200708-354

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002472

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27578

PATCH

title:Top Pageurl:http://www.checkpoint.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-002472

EXTERNAL IDS

db:NVDid:CVE-2007-4216

Trust: 3.2

db:BIDid:25365

Trust: 2.0

db:BIDid:25377

Trust: 2.0

db:SECUNIAid:26513

Trust: 1.8

db:SECTRACKid:1018589

Trust: 1.7

db:VUPENid:ADV-2007-2929

Trust: 1.7

db:JVNDBid:JVNDB-2007-002472

Trust: 0.8

db:IDEFENSEid:20070820 CHECK POINT ZONE LABS VSDATANT MULTIPLE IOCTL PRIVILEGE ESCALATION VULNERABILITIES

Trust: 0.6

db:BUGTRAQid:20070820 [REVERSEMODE ADVISORY] CHECKPOINT ZONELABS VSDATANT.SYS MULTIPLE LOCAL PRIVILEGE ESCALATION VULNERABILITIES

Trust: 0.6

db:XFid:36107

Trust: 0.6

db:CNNVDid:CNNVD-200708-354

Trust: 0.6

db:PACKETSTORMid:58736

Trust: 0.2

db:VULHUBid:VHN-27578

Trust: 0.1

db:PACKETSTORMid:58746

Trust: 0.1

sources: VULHUB: VHN-27578 // BID: 25377 // BID: 25365 // JVNDB: JVNDB-2007-002472 // PACKETSTORM: 58746 // PACKETSTORM: 58736 // CNNVD: CNNVD-200708-354 // NVD: CVE-2007-4216

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585

Trust: 2.4

url:http://www.securityfocus.com/bid/25365

Trust: 1.7

url:http://www.securityfocus.com/bid/25377

Trust: 1.7

url:http://securitytracker.com/id?1018589

Trust: 1.7

url:http://secunia.com/advisories/26513

Trust: 1.7

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=53

Trust: 1.7

url:http://www.securityfocus.com/archive/1/477155/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2929

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36107

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4216

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4216

Trust: 0.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584

Trust: 0.7

url:http://www.zonealarm.com

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/36107

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/477155/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2929

Trust: 0.6

url:http://www.zonelabs.com

Trust: 0.3

url:/archive/1/477155

Trust: 0.3

url:/archive/1/477133

Trust: 0.3

url:/archive/1/477134

Trust: 0.3

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=53

Trust: 0.1

url:http://secunia.com/product/4272/

Trust: 0.1

url:http://secunia.com/product/150/

Trust: 0.1

url:http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms&ctry=us&lang=en

Trust: 0.1

url:http://secunia.com/product/3057/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4647/

Trust: 0.1

url:http://secunia.com/product/4280/

Trust: 0.1

url:http://secunia.com/product/1960/

Trust: 0.1

url:http://secunia.com/product/151/

Trust: 0.1

url:http://secunia.com/product/152/

Trust: 0.1

url:http://secunia.com/product/5806/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6072/

Trust: 0.1

url:http://secunia.com/product/1961/

Trust: 0.1

url:http://secunia.com/product/6074/

Trust: 0.1

url:http://secunia.com/product/153/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/6073/

Trust: 0.1

url:http://secunia.com/product/4271/

Trust: 0.1

url:http://secunia.com/product/13889/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4648/

Trust: 0.1

url:http://secunia.com/product/6071/

Trust: 0.1

url:http://secunia.com/product/3056/

Trust: 0.1

url:http://secunia.com/advisories/26513/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://www.zonealarm.com/store/content/catalog/products/trial_zafamily/trial_zafamily.jsp

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://www.zonelabs.com/

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4216

Trust: 0.1

sources: VULHUB: VHN-27578 // BID: 25377 // BID: 25365 // JVNDB: JVNDB-2007-002472 // PACKETSTORM: 58746 // PACKETSTORM: 58736 // CNNVD: CNNVD-200708-354 // NVD: CVE-2007-4216

CREDITS

Ruben Santamarta※ ruben@reversemode.com

Trust: 0.6

sources: CNNVD: CNNVD-200708-354

SOURCES

db:VULHUBid:VHN-27578
db:BIDid:25377
db:BIDid:25365
db:JVNDBid:JVNDB-2007-002472
db:PACKETSTORMid:58746
db:PACKETSTORMid:58736
db:CNNVDid:CNNVD-200708-354
db:NVDid:CVE-2007-4216

LAST UPDATE DATE

2024-11-23T22:03:51.663000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27578date:2018-10-15T00:00:00
db:BIDid:25377date:2008-10-14T16:47:00
db:BIDid:25365date:2008-10-14T17:57:00
db:JVNDBid:JVNDB-2007-002472date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200708-354date:2007-08-22T00:00:00
db:NVDid:CVE-2007-4216date:2024-11-21T00:35:03.713

SOURCES RELEASE DATE

db:VULHUBid:VHN-27578date:2007-08-21T00:00:00
db:BIDid:25377date:2007-04-20T00:00:00
db:BIDid:25365date:2007-08-20T00:00:00
db:JVNDBid:JVNDB-2007-002472date:2012-06-26T00:00:00
db:PACKETSTORMid:58746date:2007-08-21T20:53:26
db:PACKETSTORMid:58736date:2007-08-21T20:09:51
db:CNNVDid:CNNVD-200708-354date:2007-08-21T00:00:00
db:NVDid:CVE-2007-4216date:2007-08-21T17:17:00