ID

VAR-200902-0559


CVE

CVE-2009-0577


TITLE

CUPS of WriteProlog Integer overflow vulnerability in functions

Trust: 0.8

sources: JVNDB: JVNDB-2009-001092

DESCRIPTION

Integer overflow in the WriteProlog function in texttops in CUPS 1.1.17 on Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2008-3640. CUPS is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before using it to allocate memory buffers. Remote attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Note that local attackers may also exploit these vulnerabilities to elevate privileges. Successful remote exploits may require printer sharing to be enabled on the vulnerable system. These issues affect versions prior to CUPS 1.3.9. Common Unix Printing System (CUPS) is a common Unix printing system and a cross-platform printing solution in the Unix environment. It is based on the Internet Printing Protocol and provides most PostScript and raster printer services. The Silicon Graphics Image (SGI) file format parsing module of CUPS has a heap overflow vulnerability when parsing malformed Run Length Encoded (RLE) data. The cause of the vulnerability is that the read_rle16() function does not properly validate the value of the line read from the file and uses this value to control how many 16-bit integers are stored in the heap buffer. If a small graphics dimension and a large number of lines are provided, it will May trigger a heap overflow. The WriteProlog() function of the CUPS texttops application uses multiple values ​​obtained from attacker-controlled content in the multiplication operation when calculating the page size used to store PostScript data. This calculation may overflow, resulting in an incorrect total page size. size. This value is then used to allocate a heap buffer filled with attacker-controlled content, triggering a heap overflow. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. This is related to: SA29809 SOLUTION: Updated packages are available via Red Hat Network. 1) Two boundary errors exist in the implementation of the HP-GL/2 filter. 2) A boundary error exists within the "read_rle16()" function when processing SGI (Silicon Graphics Image) files. PROVIDED AND/OR DISCOVERED BY: 1) regenrecht, reported via ZDI 2, 3) regenrecht, reported via iDefense CHANGELOG: 2008-10-10: Updated CVE reference list. For more information: SA32226 The vulnerabilities affect all Avaya Messaging Storage Server versions. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta 15 days left of beta period. The 1st generation of the Secunia Network Software Inspector (NSI) has been available for corporate users for almost 1 year and its been a tremendous success. The 2nd generation Secunia NSI is built on the same technology as the award winning Secunia PSI, which has already been downloaded and installed on more than 400,000 computers world wide. Learn more / Download (instant access): http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: CUPS PNG Filter Integer Overflow Vulnerability SECUNIA ADVISORY ID: SA29809 VERIFY ADVISORY: http://secunia.com/advisories/29809/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: CUPS 1.x http://secunia.com/product/921/ DESCRIPTION: Thomas Pollet has reported a vulnerability in CUPS, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to two integer overflow errors in filter/image-png.c when processing PNG files. These can be exploited to cause a heap-based buffer overflow via overly large width and height PNG fields. Successful exploitation may allow execution of arbitrary code. The vulnerability is reported in version 1.3.7. Other versions may also be affected. SOLUTION: Fixed in the SVN repository. Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Thomas Pollet ORIGINAL ADVISORY: http://www.cups.org/str.php?L2790 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2009-0577 // JVNDB: JVNDB-2009-001092 // BID: 31690 // VULHUB: VHN-38023 // PACKETSTORM: 75080 // PACKETSTORM: 73043 // PACKETSTORM: 70795 // PACKETSTORM: 72857 // PACKETSTORM: 73237 // PACKETSTORM: 65539

AFFECTED PRODUCTS

vendor:applemodel:cupsscope:eqversion:1.1.17

Trust: 1.6

vendor:cupsmodel:cupsscope:eqversion:1.1.17

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:easymodel:software products cupsscope:eqversion:1.1.10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:11x64

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.21

Trust: 0.3

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:3.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:11

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:3.1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.5

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-2

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.14

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.15

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.1

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.04

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.13

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:easymodel:software products cups rc5scope:eqversion:1.1.19

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.1

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:7.10

Trust: 0.3

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-3

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.22

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.18

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.8

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.12

Trust: 0.3

vendor:turbolinuxmodel:fujiscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:2

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.3

vendor:easymodel:software products cups rc1scope:eqversion:1.1.22

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.3

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.10

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.6

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.9

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:turbolinuxmodel:wizpyscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:easymodel:software products cupsscope:neversion:1.3.9

Trust: 0.3

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.6

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.12

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.17

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.10

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.4

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.1

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.2

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.23

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.20

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.0.4

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.10

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:3.0x64

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:turbolinuxmodel:clientscope:eqversion:2008

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.7

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.04

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.0.4-8

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0.0x64

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.7

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:easymodel:software products cups rc1scope:eqversion:1.1.23

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.16

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.19

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.04

Trust: 0.3

sources: BID: 31690 // JVNDB: JVNDB-2009-001092 // CNNVD: CNNVD-200902-466 // NVD: CVE-2009-0577

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0577
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-0577
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200902-466
value: MEDIUM

Trust: 0.6

VULHUB: VHN-38023
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-0577
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38023
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38023 // JVNDB: JVNDB-2009-001092 // CNNVD: CNNVD-200902-466 // NVD: CVE-2009-0577

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-38023 // JVNDB: JVNDB-2009-001092 // NVD: CVE-2009-0577

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-466

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200902-466

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001092

PATCH

title:Top pageurl:http://www.cups.org/

Trust: 0.8

title:1684url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1684

Trust: 0.8

title:RHSA-2009:0308url:https://rhn.redhat.com/errata/RHSA-2009-0308.html

Trust: 0.8

title:RHSA-2009:0308url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-0308J.html

Trust: 0.8

title:Red Hat Enterprise Linux Fixes for digital error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=235844

Trust: 0.6

sources: JVNDB: JVNDB-2009-001092 // CNNVD: CNNVD-200902-466

EXTERNAL IDS

db:NVDid:CVE-2009-0577

Trust: 2.8

db:SECUNIAid:33995

Trust: 2.6

db:XFid:48977

Trust: 0.8

db:JVNDBid:JVNDB-2009-001092

Trust: 0.8

db:CNNVDid:CNNVD-200902-466

Trust: 0.6

db:BIDid:31690

Trust: 0.3

db:SECUNIAid:32226

Trust: 0.2

db:VULHUBid:VHN-38023

Trust: 0.1

db:PACKETSTORMid:75080

Trust: 0.1

db:SECUNIAid:33101

Trust: 0.1

db:PACKETSTORMid:73043

Trust: 0.1

db:ZDIid:ZDI-08-067

Trust: 0.1

db:PACKETSTORMid:70795

Trust: 0.1

db:SECUNIAid:33085

Trust: 0.1

db:PACKETSTORMid:72857

Trust: 0.1

db:SECUNIAid:33260

Trust: 0.1

db:PACKETSTORMid:73237

Trust: 0.1

db:SECUNIAid:29809

Trust: 0.1

db:PACKETSTORMid:65539

Trust: 0.1

sources: VULHUB: VHN-38023 // BID: 31690 // JVNDB: JVNDB-2009-001092 // PACKETSTORM: 75080 // PACKETSTORM: 73043 // PACKETSTORM: 70795 // PACKETSTORM: 72857 // PACKETSTORM: 73237 // PACKETSTORM: 65539 // CNNVD: CNNVD-200902-466 // NVD: CVE-2009-0577

REFERENCES

url:http://secunia.com/advisories/33995

Trust: 2.5

url:http://www.redhat.com/support/errata/rhsa-2009-0308.html

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/48977

Trust: 1.7

url:http://support.avaya.com/elmodocs2/security/asa-2009-064.htm

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=486052

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9968

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0577

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/48977

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0577

Trust: 0.8

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.5

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.5

url:http://support.avaya.com/elmodocs2/security/asa-2008-470.htm

Trust: 0.4

url:http://www.cups.org/str.php?l2918

Trust: 0.4

url:http://www.cups.org/str.php?l2919

Trust: 0.4

url:http://secunia.com/advisories/32226/

Trust: 0.4

url:http://secunia.com/advisories/business_solutions/

Trust: 0.4

url:http://www.cups.org/articles.php?l575

Trust: 0.3

url:http://www.cups.org

Trust: 0.3

url:/archive/1/498013

Trust: 0.3

url:msg://bugtraq/490f6e44.4060802@idefense.com

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=753

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=752

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-261088-1

Trust: 0.3

url:http://secunia.com/advisories/29809/

Trust: 0.3

url:http://rhn.redhat.com

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2009-0308.html

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://secunia.com/advisories/33995/

Trust: 0.1

url:http://secunia.com/advisories/product/2534/

Trust: 0.1

url:http://secunia.com/advisories/33101/

Trust: 0.1

url:http://secunia.com/advisories/product/2535/

Trust: 0.1

url:http://secunia.com/advisories/product/2536/

Trust: 0.1

url:https://rhn.redhat.com/

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2008-1028.html

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://www.cups.org/relnotes.php#010123

Trust: 0.1

url:http://secunia.com/advisories/product/921/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-08-067/

Trust: 0.1

url:http://www.cups.org/str.php?l2911

Trust: 0.1

url:http://secunia.com/advisories/33085/

Trust: 0.1

url:http://secunia.com/advisories/product/8717/

Trust: 0.1

url:http://secunia.com/advisories/product/19182/

Trust: 0.1

url:http://secunia.com/advisories/product/4484/

Trust: 0.1

url:http://secunia.com/advisories/33260/

Trust: 0.1

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0338

Trust: 0.1

url:http://secunia.com/advisories/product/10614/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/921/

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://www.cups.org/str.php?l2790

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-38023 // BID: 31690 // JVNDB: JVNDB-2009-001092 // PACKETSTORM: 75080 // PACKETSTORM: 73043 // PACKETSTORM: 70795 // PACKETSTORM: 72857 // PACKETSTORM: 73237 // PACKETSTORM: 65539 // CNNVD: CNNVD-200902-466 // NVD: CVE-2009-0577

CREDITS

Secunia

Trust: 0.6

sources: PACKETSTORM: 75080 // PACKETSTORM: 73043 // PACKETSTORM: 70795 // PACKETSTORM: 72857 // PACKETSTORM: 73237 // PACKETSTORM: 65539

SOURCES

db:VULHUBid:VHN-38023
db:BIDid:31690
db:JVNDBid:JVNDB-2009-001092
db:PACKETSTORMid:75080
db:PACKETSTORMid:73043
db:PACKETSTORMid:70795
db:PACKETSTORMid:72857
db:PACKETSTORMid:73237
db:PACKETSTORMid:65539
db:CNNVDid:CNNVD-200902-466
db:NVDid:CVE-2009-0577

LAST UPDATE DATE

2024-11-23T19:43:18.917000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38023date:2023-02-13T00:00:00
db:BIDid:31690date:2015-04-13T22:01:00
db:JVNDBid:JVNDB-2009-001092date:2009-03-25T00:00:00
db:CNNVDid:CNNVD-200902-466date:2023-05-05T00:00:00
db:NVDid:CVE-2009-0577date:2024-11-21T01:00:23.237

SOURCES RELEASE DATE

db:VULHUBid:VHN-38023date:2009-02-20T00:00:00
db:BIDid:31690date:2008-10-09T00:00:00
db:JVNDBid:JVNDB-2009-001092date:2009-03-25T00:00:00
db:PACKETSTORMid:75080date:2009-02-20T14:09:36
db:PACKETSTORMid:73043date:2008-12-16T12:15:45
db:PACKETSTORMid:70795date:2008-10-10T23:03:15
db:PACKETSTORMid:72857date:2008-12-10T11:55:21
db:PACKETSTORMid:73237date:2008-12-26T13:58:27
db:PACKETSTORMid:65539date:2008-04-15T23:22:47
db:CNNVDid:CNNVD-200902-466date:2008-10-09T00:00:00
db:NVDid:CVE-2009-0577date:2009-02-20T19:30:00.233