ID

VAR-200902-0092


CVE

CVE-2009-0418


TITLE

IPv6 implementations insecurely update Forwarding Information Base

Trust: 0.8

sources: CERT/CC: VU#472363

DESCRIPTION

The IPv6 Neighbor Discovery Protocol (NDP) implementation in HP HP-UX B.11.11, B.11.23, and B.11.31 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity), read private network traffic, and possibly execute arbitrary code via a spoofed message that modifies the Forward Information Base (FIB), a related issue to CVE-2008-2476. A vulnerability in some implementations of the IPv6 Neighbor Discovery Protocol may allow a nearby attacker to intercept traffic or cause congested links to become overloaded. This vulnerability CVE-2008-2476 Vulnerability associated with. This can be exploited to cause the IPv6 stack to panic by sending specially crafted ICMPv6 messages to a vulnerable system. 2008-09-03 19:09:47 UTC (RELENG_7, 7.1-PRERELEASE) 2008-09-03 19:09:47 UTC (RELENG_7_0, 7.0-RELEASE-p4) 2008-09-03 19:09:47 UTC (RELENG_6, 6.4-PRERELEASE) 2008-09-03 19:09:47 UTC (RELENG_6_3, 6.3-RELEASE-p4) Patch: http://security.FreeBSD.org/patches/SA-08:09/icmp6.patch PROVIDED AND/OR DISCOVERED BY: The vendor credits Tom Parker and Bjoern A. Zeeb. ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: HP-UX IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability SECUNIA ADVISORY ID: SA33787 VERIFY ADVISORY: http://secunia.com/advisories/33787/ CRITICAL: Less critical IMPACT: Spoofing, Exposure of sensitive information, DoS WHERE: >From local network OPERATING SYSTEM: HP-UX 11.x http://secunia.com/advisories/product/138/ DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, or to cause a DoS (Denial of Service). This is related to: SA32112 The vulnerability is reported in HP-UX B.11.11, B.11.23, and B.11.31 running IPv6. SOLUTION: Apply patches. HP-UX B.11.11: Install patch PHNE_37898 or subsequent. HP-UX B.11.23: Install patch PHNE_37897 or subsequent. HP-UX B.11.31: Install patch PHNE_38680 or subsequent. For more information: SA32112 2) An unspecified error exists in the handling of PPPoE discovery packets. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Juniper Products Neighbor Discovery Protocol Neighbor Solicitation Vulnerability SECUNIA ADVISORY ID: SA32116 VERIFY ADVISORY: http://secunia.com/advisories/32116/ CRITICAL: Less critical IMPACT: Manipulation of data WHERE: >From local network OPERATING SYSTEM: Juniper IVE OS Software 1.x http://secunia.com/advisories/product/11660/ Juniper IVE OS Software 2.x http://secunia.com/advisories/product/11661/ Juniper IVE OS Software 3.x http://secunia.com/advisories/product/11662/ Juniper IVE OS Software 5.x http://secunia.com/advisories/product/6644/ Juniper IVE OS Software 4.x http://secunia.com/advisories/product/6645/ Juniper IVE OS Software 6.x http://secunia.com/advisories/product/18562/ Juniper Networks DXOS 5.x http://secunia.com/advisories/product/11183/ Juniper Networks IDP 4.x http://secunia.com/advisories/product/11181/ Juniper Networks Infranet Controller 4000 http://secunia.com/advisories/product/11167/ Juniper Networks WXC Series http://secunia.com/advisories/product/11164/ Juniper Networks WX Series http://secunia.com/advisories/product/11163/ Juniper Networks Session and Resource Control (SRC) 2.x http://secunia.com/advisories/product/19036/ Juniper Networks Secure Access 6000 SP http://secunia.com/advisories/product/13184/ Juniper Networks Secure Access 4000 (NetScreen-SA 3000 Series) http://secunia.com/advisories/product/3141/ Juniper Networks Secure Access 2000 http://secunia.com/advisories/product/11165/ Juniper Networks Infranet Controller 6000 http://secunia.com/advisories/product/11168/ Juniper Networks Secure Access 6000 (NetScreen-SA 5000 Series) http://secunia.com/advisories/product/3132/ Juniper Networks Secure Access 700 http://secunia.com/advisories/product/11166/ Juniper Networks Session and Resource Control (SRC) 1.x http://secunia.com/advisories/product/19034/ DESCRIPTION: A vulnerability has been reported in multiple Juniper Networks products, which can be exploited by malicious people to manipulate the router's neighbor cache. This can be exploited to add a fake entry to the router's neighbor cache via a neighbor solicitation request containing a spoofed IPv6 address. Successful exploitation may allow the interception or disruption of network traffic, but requires that the IPv6 nodes involved in the attack are using the same router. NOTE: The vendor has not published a publicly available advisory and has also refused to provide a list of the affected products or patches as information about vulnerabilities is provided to registered customers only. It is therefore unclear if only a subset of the products reported as vulnerable in this advisory are affected. SOLUTION: It is currently unclear whether fixes are available. PROVIDED AND/OR DISCOVERED BY: US-CERT credits David Miles. ORIGINAL ADVISORY: Juniper (login required): https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-036&viewMode=view US-CERT: http://www.kb.cert.org/vuls/id/MAPG-7H2RZU OTHER REFERENCES: US-CERT VU#472363: http://www.kb.cert.org/vuls/id/472363 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.15

sources: NVD: CVE-2009-0418 // CERT/CC: VU#472363 // JVNDB: JVNDB-2009-001350 // BID: 31529 // PACKETSTORM: 69638 // PACKETSTORM: 74623 // PACKETSTORM: 70557 // PACKETSTORM: 75476 // PACKETSTORM: 70559 // PACKETSTORM: 70814

AFFECTED PRODUCTS

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.6

vendor:hpmodel:hp-uxscope:eqversion:b.11.23

Trust: 1.6

vendor:hpmodel:hp-uxscope:eqversion:b.11.11

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:ibm zseriesmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:windmodel:river systems vxworksscope:eqversion:6.4

Trust: 0.3

vendor:windmodel:river systems vxworksscope:eqversion:5

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.4

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.3

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:4.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.1

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.1

Trust: 0.3

vendor:netbsdmodel:3,1 rc1scope: - version: -

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:midnightbsdmodel:midnightbsdscope:eqversion:0.2.1

Trust: 0.3

vendor:midnightbsdmodel:midnightbsdscope:eqversion:0.1.1

Trust: 0.3

vendor:midnightbsdmodel:midnightbsdscope:eqversion:0.3

Trust: 0.3

vendor:midnightbsdmodel:midnightbsdscope:eqversion:0.1

Trust: 0.3

vendor:junipermodel:networks wxc seriesscope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks wx seriesscope:eqversion:0

Trust: 0.3

vendor:junipermodel:networks session and resource control appliancescope:eqversion:2.0

Trust: 0.3

vendor:junipermodel:networks session and resource control appliancescope:eqversion:1.0

Trust: 0.3

vendor:junipermodel:networks secure accessscope:eqversion:7000

Trust: 0.3

vendor:junipermodel:networks secure access spscope:eqversion:60006000

Trust: 0.3

vendor:junipermodel:networks secure accessscope:eqversion:600050000

Trust: 0.3

vendor:junipermodel:networks secure accessscope:eqversion:400030000

Trust: 0.3

vendor:junipermodel:networks secure accessscope:eqversion:20000

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:5.0

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:4.0

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:3.0

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:2.0

Trust: 0.3

vendor:junipermodel:networks ive osscope:eqversion:1.0

Trust: 0.3

vendor:junipermodel:networks infranet controllerscope:eqversion:6000

Trust: 0.3

vendor:junipermodel:networks infranet controllerscope:eqversion:4000

Trust: 0.3

vendor:junipermodel:networks idpscope:eqversion:4.0

Trust: 0.3

vendor:junipermodel:networks dxosscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:z/osscope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux 11iscope:eqversion:v3

Trust: 0.3

vendor:hpmodel:hp-ux 11iscope:eqversion:v2

Trust: 0.3

vendor:hpmodel:hp-ux 11iscope:eqversion:v1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.0.x

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-release-p1scope:eqversion:7.1

Trust: 0.3

vendor:freebsdmodel:7.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:7.0-releasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:beta4scope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:7.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.3

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:6.2

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p10scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:6.0

Trust: 0.3

vendor:force10model:networks ftosscope:eqversion:7.7.11

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:airport extreme base stationscope:eqversion:0

Trust: 0.3

vendor:applemodel:airport expressscope:eqversion:6.3

Trust: 0.3

vendor:applemodel:airport expressscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:airport base stationscope: - version: -

Trust: 0.3

vendor:applemodel:time capsulescope:neversion:7.4.1

Trust: 0.3

vendor:applemodel:airport extreme base station with 802.11nscope:neversion:7.4.1

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:neversion:7.4.1

Trust: 0.3

sources: CERT/CC: VU#472363 // BID: 31529 // JVNDB: JVNDB-2009-001350 // CNNVD: CNNVD-200902-085 // NVD: CVE-2009-0418

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0418
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#472363
value: 2.70

Trust: 0.8

NVD: CVE-2009-0418
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200902-085
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2009-0418
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#472363 // JVNDB: JVNDB-2009-001350 // CNNVD: CNNVD-200902-085 // NVD: CVE-2009-0418

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2009-001350 // NVD: CVE-2009-0418

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-085

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200902-085

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001350

PATCH

title:Top Pageurl:http://www.hp.com/country/jp/ja/

Trust: 0.8

sources: JVNDB: JVNDB-2009-001350

EXTERNAL IDS

db:NVDid:CVE-2009-0418

Trust: 2.7

db:SECUNIAid:33787

Trust: 1.7

db:SECTRACKid:1021660

Trust: 1.6

db:VUPENid:ADV-2009-0312

Trust: 1.6

db:CERT/CCid:VU#472363

Trust: 1.4

db:JVNDBid:JVNDB-2009-001350

Trust: 0.8

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5943

Trust: 0.6

db:HPid:SSRT080107

Trust: 0.6

db:CNNVDid:CNNVD-200902-085

Trust: 0.6

db:BIDid:31529

Trust: 0.3

db:SECUNIAid:32117

Trust: 0.2

db:SECUNIAid:32112

Trust: 0.2

db:SECUNIAid:32116

Trust: 0.2

db:SECUNIAid:31745

Trust: 0.1

db:PACKETSTORMid:69638

Trust: 0.1

db:PACKETSTORMid:74623

Trust: 0.1

db:PACKETSTORMid:70557

Trust: 0.1

db:SECUNIAid:34105

Trust: 0.1

db:PACKETSTORMid:75476

Trust: 0.1

db:PACKETSTORMid:70559

Trust: 0.1

db:PACKETSTORMid:70814

Trust: 0.1

sources: CERT/CC: VU#472363 // BID: 31529 // JVNDB: JVNDB-2009-001350 // PACKETSTORM: 69638 // PACKETSTORM: 74623 // PACKETSTORM: 70557 // PACKETSTORM: 75476 // PACKETSTORM: 70559 // PACKETSTORM: 70814 // CNNVD: CNNVD-200902-085 // NVD: CVE-2009-0418

REFERENCES

url:http://www.securitytracker.com/id?1021660

Trust: 1.6

url:http://secunia.com/advisories/33787

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=123368621330334&w=2

Trust: 1.6

url:http://www.ietf.org/rfc/rfc2461.txt

Trust: 1.1

url:http://www.ietf.org/rfc/rfc3756.txt

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5943

Trust: 1.0

url:http://www.vupen.com/english/advisories/2009/0312

Trust: 1.0

url:http://www.kb.cert.org/vuls/id/472363

Trust: 0.9

url:http://tools.ietf.org/html/rfc4861

Trust: 0.8

url:http://tools.ietf.org/html/rfc4861#section-2.1

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3177.txt

Trust: 0.8

url:http://tools.ietf.org/html/rfc3971

Trust: 0.8

url:http://docs.sun.com/app/docs/doc/817-0573/6mgc65bb6?a=view

Trust: 0.8

url:http://msdn.microsoft.com/en-us/library/ms900123.aspx

Trust: 0.8

url:http://en.wikipedia.org/wiki/forwarding_information_base#fibs_in_ingress_filtering_against_denial_of_service

Trust: 0.8

url:http://en.wikipedia.org/wiki/reverse_path_forwarding

Trust: 0.8

url:http://www.openbsd.org/faq/pf/filter.html#antispoof

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0418

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0418

Trust: 0.8

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0312

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5943

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.5

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.5

url:http://support.apple.com/kb/ht3467

Trust: 0.4

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662367

Trust: 0.4

url:http://www.kb.cert.org/vuls/id/mapg-7h2rzu

Trust: 0.4

url:http://www.midnightbsd.org/

Trust: 0.3

url:http://www.openbsd.org/errata43.html#005_ndp

Trust: 0.3

url:http://www.openbsd.org/errata42.html#014_ndp

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2009-059.htm

Trust: 0.3

url:http://www.openbsd.org/errata44.html#001_ndp

Trust: 0.3

url:http://secunia.com/advisories/32112/

Trust: 0.3

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.3

url:http://secunia.com/advisories/31745/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.2

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:09/icmp6.patch

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://security.freebsd.org/advisories/freebsd-sa-08:09.icmp6.asc

Trust: 0.1

url:http://secunia.com/product/6778/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/138/

Trust: 0.1

url:http://secunia.com/advisories/33787/

Trust: 0.1

url:http://secunia.com/advisories/product/20024/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/mapg-7h2ry7

Trust: 0.1

url:http://secunia.com/advisories/32117/

Trust: 0.1

url:http://secunia.com/advisories/34105/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:10/nd6-6.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:10/nd6-6.patch

Trust: 0.1

url:http://security.freebsd.org/advisories/freebsd-sa-08:10.nd6.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:10/nd6-7.patch.asc

Trust: 0.1

url:http://secunia.com/advisories/product/6778/

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:10/nd6-7.patch

Trust: 0.1

url:http://secunia.com/advisories/product/11167/

Trust: 0.1

url:http://secunia.com/advisories/product/11181/

Trust: 0.1

url:http://secunia.com/advisories/product/18562/

Trust: 0.1

url:http://secunia.com/advisories/product/19034/

Trust: 0.1

url:http://secunia.com/advisories/product/11660/

Trust: 0.1

url:http://secunia.com/advisories/product/11165/

Trust: 0.1

url:http://secunia.com/advisories/product/11662/

Trust: 0.1

url:http://secunia.com/advisories/product/11168/

Trust: 0.1

url:http://secunia.com/advisories/product/11163/

Trust: 0.1

url:http://secunia.com/advisories/product/11166/

Trust: 0.1

url:http://secunia.com/advisories/product/13184/

Trust: 0.1

url:http://secunia.com/advisories/32116/

Trust: 0.1

url:https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search&txtalertnumber=psn-2008-09-036&viewmode=view

Trust: 0.1

url:http://secunia.com/advisories/product/3132/

Trust: 0.1

url:http://secunia.com/advisories/product/11661/

Trust: 0.1

url:http://secunia.com/advisories/product/11183/

Trust: 0.1

url:http://secunia.com/advisories/product/19036/

Trust: 0.1

url:http://secunia.com/advisories/product/3141/

Trust: 0.1

url:http://secunia.com/advisories/product/11164/

Trust: 0.1

url:http://secunia.com/advisories/product/6645/

Trust: 0.1

url:http://secunia.com/advisories/product/6644/

Trust: 0.1

sources: CERT/CC: VU#472363 // BID: 31529 // JVNDB: JVNDB-2009-001350 // PACKETSTORM: 69638 // PACKETSTORM: 74623 // PACKETSTORM: 70557 // PACKETSTORM: 75476 // PACKETSTORM: 70559 // PACKETSTORM: 70814 // CNNVD: CNNVD-200902-085 // NVD: CVE-2009-0418

CREDITS

David Miles reported this issue.

Trust: 0.9

sources: BID: 31529 // CNNVD: CNNVD-200902-085

SOURCES

db:CERT/CCid:VU#472363
db:BIDid:31529
db:JVNDBid:JVNDB-2009-001350
db:PACKETSTORMid:69638
db:PACKETSTORMid:74623
db:PACKETSTORMid:70557
db:PACKETSTORMid:75476
db:PACKETSTORMid:70559
db:PACKETSTORMid:70814
db:CNNVDid:CNNVD-200902-085
db:NVDid:CVE-2009-0418

LAST UPDATE DATE

2024-11-23T20:35:26.894000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#472363date:2009-04-27T00:00:00
db:BIDid:31529date:2015-03-19T09:41:00
db:JVNDBid:JVNDB-2009-001350date:2009-06-30T00:00:00
db:CNNVDid:CNNVD-200902-085date:2009-03-04T00:00:00
db:NVDid:CVE-2009-0418date:2024-11-21T00:59:51.647

SOURCES RELEASE DATE

db:CERT/CCid:VU#472363date:2008-10-02T00:00:00
db:BIDid:31529date:2008-10-02T00:00:00
db:JVNDBid:JVNDB-2009-001350date:2009-06-30T00:00:00
db:PACKETSTORMid:69638date:2008-09-04T22:06:24
db:PACKETSTORMid:74623date:2009-02-03T17:55:30
db:PACKETSTORMid:70557date:2008-10-02T21:01:10
db:PACKETSTORMid:75476date:2009-03-06T11:40:34
db:PACKETSTORMid:70559date:2008-10-02T21:01:10
db:PACKETSTORMid:70814date:2008-10-11T01:26:40
db:CNNVDid:CNNVD-200902-085date:2009-02-04T00:00:00
db:NVDid:CVE-2009-0418date:2009-02-04T19:30:00.547