ID

VAR-200809-0188


CVE

CVE-2008-3614


TITLE

Multiple PHP XML-RPC implementations vulnerable to code injection

Trust: 0.8

sources: CERT/CC: VU#442845

DESCRIPTION

Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image, which triggers heap corruption. A vulnerability in a common PHP extension module could allow a remote attacker to execute code on a vulnerable system. These issues arise when the application handles specially crafted PICT image files, movies, and QTVR movies. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user and to trigger a denial-of-service condition. Versions prior to QuickTime 7.5.5 are affected. NOTE: Two issues that were previously covered in this BID were given their own records to better document the details: - CVE-2008-3626 was moved to BID 31546 ('Apple QuickTime 'STSZ' Atoms Memory Corruption Vulnerability') - CVE-2008-3629 was moved to BID 31548 ('Apple QuickTime PICT Denial of Service Vulnerability'). Apple QuickTime is a very popular multimedia player. iDefense Security Advisory 09.09.08 http://labs.idefense.com/intelligence/vulnerabilities/ Sep 09, 2008 I. BACKGROUND Quicktime is Apple's media player product, and is used to render video and other media. The PICT file format was developed by Apple Inc. in 1984. PICT files can contain both object oriented images and bitmaps. For more information visit the vendor's web site at the following URL. http://www.apple.com/quicktime/ II. This issue results in heap corruption which can lead to arbitrary code execution. III. ANALYSIS Exploitation of this issue results in arbitrary code execution in the security context of the current user. An attacker would need to host a web page containing a malformed PICT file. Upon visiting the malicious web page exploitation would occur. Alternatively a malicious PICT file could be attached to an e-mail. IV. Older versions are also suspected to be vulnerable. V. WORKAROUND iDefense recommends disabling the QuickTime Plug-in and altering the .pic and .pict file type associations within the registry. Disabling the plug-in will prevent web browsers from utilizing QuickTime Player to view associated media files. Removing the file type associations within the registry will prevent QuickTime Player and Picture Viewer from opening .pic and .pict files. VI. VENDOR RESPONSE Apple has released QuickTime 7.5.5 which resolves this issue. More information is available via Apple's QuickTime Security Update page at the URL shown below. http://support.apple.com/kb/HT3027 VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-3614 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 05/13/2008 Initial vendor notification 05/22/2008 Initial vendor response 09/09/2008 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Nucleus XML-RPC PHP Code Execution Vulnerability SECUNIA ADVISORY ID: SA15895 VERIFY ADVISORY: http://secunia.com/advisories/15895/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Nucleus 3.x http://secunia.com/product/3699/ DESCRIPTION: A vulnerability has been reported in Nucleus, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA15852 SOLUTION: Update to version 3.21. http://sourceforge.net/project/showfiles.php?group_id=66479 OTHER REFERENCES: SA15852: http://secunia.com/advisories/15852/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Trust: 2.88

sources: NVD: CVE-2008-3614 // CERT/CC: VU#442845 // JVNDB: JVNDB-2008-001684 // BID: 31086 // VULHUB: VHN-33739 // PACKETSTORM: 69815 // PACKETSTORM: 38388

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:drupalmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:pear xml rpcmodel: - scope: - version: -

Trust: 0.8

vendor:phpxmlrpcmodel: - scope: - version: -

Trust: 0.8

vendor:postnukemodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:serendipitymodel: - scope: - version: -

Trust: 0.8

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wordpressmodel: - scope: - version: -

Trust: 0.8

vendor:xoopsmodel: - scope: - version: -

Trust: 0.8

vendor:phpmyfaqmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.5.5

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

sources: CERT/CC: VU#442845 // BID: 31086 // JVNDB: JVNDB-2008-001684 // CNNVD: CNNVD-200809-117 // NVD: CVE-2008-3614

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3614
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#442845
value: 20.75

Trust: 0.8

NVD: CVE-2008-3614
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200809-117
value: MEDIUM

Trust: 0.6

VULHUB: VHN-33739
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-3614
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33739
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#442845 // VULHUB: VHN-33739 // JVNDB: JVNDB-2008-001684 // CNNVD: CNNVD-200809-117 // NVD: CVE-2008-3614

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-33739 // JVNDB: JVNDB-2008-001684 // NVD: CVE-2008-3614

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 69815 // CNNVD: CNNVD-200809-117

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200809-117

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001684

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-33739

PATCH

title:Security Update 2008-006url:http://support.apple.com/kb/HT3137

Trust: 0.8

title:QuickTime 7.5.5url:http://support.apple.com/kb/HT3027

Trust: 0.8

title:QuickTime 7.5.5url:http://support.apple.com/kb/HT3027?viewlocale=ja_JP

Trust: 0.8

title:Security Update 2008-006url:http://support.apple.com/kb/HT3137?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001684

EXTERNAL IDS

db:NVDid:CVE-2008-3614

Trust: 2.9

db:BIDid:31086

Trust: 2.8

db:SECUNIAid:31821

Trust: 2.5

db:SECUNIAid:31882

Trust: 2.5

db:SECTRACKid:1020841

Trust: 2.5

db:VUPENid:ADV-2008-2584

Trust: 1.7

db:VUPENid:ADV-2008-2527

Trust: 1.7

db:SECTRACKid:1020879

Trust: 1.7

db:USCERTid:TA08-260A

Trust: 1.7

db:SECUNIAid:15895

Trust: 0.9

db:SECUNIAid:15810

Trust: 0.8

db:SECUNIAid:15922

Trust: 0.8

db:SECUNIAid:15852

Trust: 0.8

db:SECUNIAid:15855

Trust: 0.8

db:SECUNIAid:15861

Trust: 0.8

db:SECUNIAid:15862

Trust: 0.8

db:SECUNIAid:15872

Trust: 0.8

db:SECUNIAid:15883

Trust: 0.8

db:SECUNIAid:15884

Trust: 0.8

db:BIDid:14088

Trust: 0.8

db:SECTRACKid:1014327

Trust: 0.8

db:CERT/CCid:VU#442845

Trust: 0.8

db:JVNDBid:JVNDB-2008-001684

Trust: 0.8

db:IDEFENSEid:20080909 APPLE QUICKTIME PICT INTEGER OVERFLOW VULNERABILITY

Trust: 0.6

db:CERT/CCid:TA08-260A

Trust: 0.6

db:APPLEid:APPLE-SA-2008-09-15

Trust: 0.6

db:APPLEid:APPLE-SA-2008-09-09

Trust: 0.6

db:CNNVDid:CNNVD-200809-117

Trust: 0.6

db:ZDIid:ZDI-08-062

Trust: 0.3

db:ZDIid:ZDI-08-060

Trust: 0.3

db:ZDIid:ZDI-08-057

Trust: 0.3

db:ZDIid:ZDI-08-058

Trust: 0.3

db:ZDIid:ZDI-08-061

Trust: 0.3

db:PACKETSTORMid:69815

Trust: 0.2

db:VULHUBid:VHN-33739

Trust: 0.1

db:PACKETSTORMid:38388

Trust: 0.1

sources: CERT/CC: VU#442845 // VULHUB: VHN-33739 // BID: 31086 // JVNDB: JVNDB-2008-001684 // PACKETSTORM: 69815 // PACKETSTORM: 38388 // CNNVD: CNNVD-200809-117 // NVD: CVE-2008-3614

REFERENCES

url:http://www.securityfocus.com/bid/31086

Trust: 2.5

url:http://securitytracker.com/id?1020841

Trust: 2.5

url:http://secunia.com/advisories/31821

Trust: 2.5

url:http://secunia.com/advisories/31882

Trust: 2.5

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=744

Trust: 2.0

url:http://support.apple.com/kb/ht3027

Trust: 1.8

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 1.7

url:http://support.apple.com/kb/ht3137

Trust: 1.7

url:http://www.securitytracker.com/id?1020879

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/2584

Trust: 1.4

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15851

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2527

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.1

url:http://secunia.com/advisories/15895/

Trust: 0.9

url:http://secunia.com/advisories/15852/

Trust: 0.9

url:http://www.hardened-php.net/advisory-022005.php

Trust: 0.8

url:http://secunia.com/advisories/15861/

Trust: 0.8

url:http://secunia.com/advisories/15862/

Trust: 0.8

url:http://secunia.com/advisories/15884/

Trust: 0.8

url:http://secunia.com/advisories/15883/

Trust: 0.8

url:http://news.postnuke.com/modules.php?op=modload&name=news&file=article&sid=2699

Trust: 0.8

url:http://secunia.com/advisories/15855/

Trust: 0.8

url:http://secunia.com/advisories/15810/

Trust: 0.8

url:http://secunia.com/advisories/15872/

Trust: 0.8

url:http://secunia.com/advisories/15922/

Trust: 0.8

url:http://securitytracker.com/alerts/2005/jun/1014327.html

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00088-07022005

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00087-07012005

Trust: 0.8

url:http://www.securityfocus.com/bid/14088

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3614

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3614

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2527

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.4

url:http://www.ngssoftware.com/advisories/critical-vulnerability-in-apple-quicktimes-indeo-codec/

Trust: 0.3

url:http://blog.watchfire.com/wfblog/2008/09/quicktime-patch.html

Trust: 0.3

url:/archive/1/496358

Trust: 0.3

url:/archive/1/496180

Trust: 0.3

url:/archive/1/496161

Trust: 0.3

url:/archive/1/496163

Trust: 0.3

url:/archive/1/496175

Trust: 0.3

url:/archive/1/496176

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-060/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-057/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-062/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-058/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-061/

Trust: 0.3

url:http://cve.mitre.org/),

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3614

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/3699/

Trust: 0.1

url:http://sourceforge.net/project/showfiles.php?group_id=66479

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#442845 // VULHUB: VHN-33739 // BID: 31086 // JVNDB: JVNDB-2008-001684 // PACKETSTORM: 69815 // PACKETSTORM: 38388 // CNNVD: CNNVD-200809-117 // NVD: CVE-2008-3614

CREDITS

Sergio AlvarezDavid WhartonRoee HayZDI※http://www.zerodayinitiative.com/

Trust: 0.6

sources: CNNVD: CNNVD-200809-117

SOURCES

db:CERT/CCid:VU#442845
db:VULHUBid:VHN-33739
db:BIDid:31086
db:JVNDBid:JVNDB-2008-001684
db:PACKETSTORMid:69815
db:PACKETSTORMid:38388
db:CNNVDid:CNNVD-200809-117
db:NVDid:CVE-2008-3614

LAST UPDATE DATE

2024-09-20T20:18:39.260000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#442845date:2007-03-09T00:00:00
db:VULHUBid:VHN-33739date:2018-10-30T00:00:00
db:BIDid:31086date:2008-10-03T16:28:00
db:JVNDBid:JVNDB-2008-001684date:2008-09-29T00:00:00
db:CNNVDid:CNNVD-200809-117date:2008-11-15T00:00:00
db:NVDid:CVE-2008-3614date:2018-10-30T16:25:38.340

SOURCES RELEASE DATE

db:CERT/CCid:VU#442845date:2005-07-06T00:00:00
db:VULHUBid:VHN-33739date:2008-09-11T00:00:00
db:BIDid:31086date:2008-09-09T00:00:00
db:JVNDBid:JVNDB-2008-001684date:2008-09-29T00:00:00
db:PACKETSTORMid:69815date:2008-09-10T08:57:38
db:PACKETSTORMid:38388date:2005-07-01T23:31:00
db:CNNVDid:CNNVD-200809-117date:2008-09-11T00:00:00
db:NVDid:CVE-2008-3614date:2008-09-11T01:13:09.243