ID

VAR-200904-0278


CVE

CVE-2009-0993


TITLE

Oracle Application Server of OPMN Component vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-001235

DESCRIPTION

Unspecified vulnerability in the OPMN component in Oracle Application Server 10.1.2.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a format string vulnerability that allows remote attackers to execute arbitrary code via format string specifiers in an HTTP POST URI, which are not properly handled when logging to opmn/logs/opmn.log. Authentication is not required to exploit this vulnerability.The specific flaw exists within the Oracle Process Manager and Notification (opmn) daemon which is an HTTP daemon listening on a TCP port above 6000. Exploitation of this issue can result in arbitrary code execution. Oracle has released the April 2009 critical patch update that addresses 43 vulnerabilities affecting the following software: Oracle Database Oracle Audit Vault Oracle Application Server Oracle Outside In SDK HTML Export Oracle XML Publisher Oracle BI Publisher Oracle E-Business Suite PeopleSoft Enterprise PeopleTools PeopleSoft Enterprise HRMS Oracle WebLogic Server (formerly BEA WebLogic Server) Oracle Data Service Integrator Oracle AquaLogic Data Services Platform Oracle JRockit. ---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. For more information see vulnerability #6 through #9 in: SA34693 SOLUTION: The vendor recommends to delete the GdFileConv.exe file. See vendor's advisory for additional details. Fixed in Good Messaging Server for Exchange 5.0.4.53 and 6.0.0.125. ZDI-09-017: Oracle Applications Server 10g Format String Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-017 April 14, 2009 -- Affected Vendors: Oracle -- Affected Products: Oracle Application Server -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 5729. Authentication is not required to exploit this vulnerability. More details can be found at: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpua pr2009.html -- Disclosure Timeline: 2007-11-07 - Vulnerability reported to vendor 2009-04-14 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Joxean Koret -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ . I. Description The Oracle Critical Patch Update Advisory - April 2009 addresses 43 vulnerabilities in various Oracle products and components. Oracle has associated CVE identifiers with the vulnerabilities addressed in this Critical Patch Update. If significant additional details about vulnerabilities and remediation techniques become available, we will update the Vulnerability Notes Database. II. Impact The impact of these vulnerabilities varies depending on the product, component, and configuration of the system. Vulnerable components may be available to unauthenticated, remote attackers. An attacker who compromises an Oracle database may be able to access sensitive information. III. Solution Apply the appropriate patches or upgrade as specified in the Oracle Critical Patch Update Advisory - April 2009. Note that this document only lists newly corrected issues. Updates to patches for previously known issues are not listed. IV. References * Oracle Critical Patch Update Advisory - April 2009 - <http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html> * Critical Patch Updates and Security Alerts - <http://www.oracle.com/technology/deploy/security/alerts.htm> * Map of Public Vulnerability to Advisory/Alert - <http://www.oracle.com/technology/deploy/security/pdf/public_vuln_to_advisory_mapping.html> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA09-105A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA09-105A Feedback VU#955892" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History April 15, 2009: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSeY3bnIHljM+H4irAQIWvAf/dUpbNet17XLIfzFwu5wwA5wNm0foqBk4 2PYNO2+ENjlLwT2Rn0dx3xu/C1aPGVxw53EI7doWJubO/W9K2WgOrTs8k7iF65Do dsTWGPi36XzIh4KShJ8NVssNUUqSyyD1QvCXxtOOuKFXfGRRAZlYTGYgYl92QjXM h6j8KKFHqvUdCg4+F+qB3TryswLk0/b2Si2+HW1cWGWpSryKfzIAZv5s2HfvW1Iy 11fssZkyR0lvalVs/YSmiO3fsZZ2yigVL5WOwTUGreWnjKH+k13ooror0x5sIcwU bsfgxHssykStG+UbhxPW8Me6hrEyWkYJoziykWWo+5pCqbwGeqgSYw== =kziE -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Some have unknown impacts, others can be exploited by malicious users to conduct SQL injection attacks or disclose sensitive information, and by malicious people compromise a vulnerable system. 2) Input passed to the "DBMS_AQIN" package is not properly sanitised before being used. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) An error in the Application Express component included in Oracle Database can be exploited by unprivileged database users to disclose APEX password hashes in "LOWS_030000.WWV_FLOW_USER". The remaining vulnerabilities are caused due to unspecified errors. No more information is currently available. PROVIDED AND/OR DISCOVERED BY: 1) Joxean Koret of TippingPoint 2, 3) Alexander Kornbrust of Red Database Security The vendor also credits: * Joshua J. Drake of iDefense * Gerhard Eschelbeck of Qualys, Inc. * Esteban Martinez Fayo of Application Security, Inc. * Franz Huell of Red Database Security; * Mike Janowski of Neohapsis, Inc. * Joxean Koret * David Litchfield of NGS Software * Tanel Poder * Sven Vetter of Trivadis * Dennis Yurichev ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html ZDI: http://www.zerodayinitiative.com/advisories/ZDI-09-017/ Red Database Security: http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html http://www.red-database-security.com/advisory/apex_password_hashes.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.97

sources: NVD: CVE-2009-0993 // JVNDB: JVNDB-2009-001235 // ZDI: ZDI-09-017 // BID: 34461 // VULMON: CVE-2009-0993 // PACKETSTORM: 77574 // PACKETSTORM: 76656 // PACKETSTORM: 76710 // PACKETSTORM: 76704

AFFECTED PRODUCTS

vendor:oraclemodel:application serverscope:eqversion:10.1.2.3.0

Trust: 1.0

vendor:oraclemodel:application serverscope:eqversion:10.1.2.3

Trust: 0.8

vendor:oraclemodel:application serverscope: - version: -

Trust: 0.7

vendor:oraclemodel:application server 10gscope:eqversion:10.1.2.3

Trust: 0.6

vendor:oraclemodel:jrockit r27.1.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:5.6.2

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic portal sp1scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle9i personal edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.49

Trust: 0.3

vendor:oraclemodel:oracle11g standard edition onescope:eqversion:11.16

Trust: 0.3

vendor:oraclemodel:data service integratorscope:eqversion:10.3

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.3

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:10.1.3.2.1

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.3.0

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.8.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic portal sp6scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:10.1.3.2

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.16

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.5

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.1.0.7

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:10.0

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.2scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:beamodel:systems weblogic portal sp2scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:beamodel:systems weblogic portal sp5scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:10.3

Trust: 0.3

vendor:beamodel:systems weblogic portal sp3scope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic portalscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.1

Trust: 0.3

vendor:beamodel:systems weblogic server maintenance packscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.8

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:oraclemodel:oracle9i standard edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.3

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.5

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.0

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise hrmsscope:eqversion:9.0

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.2

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.10.2

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.16

Trust: 0.3

vendor:beamodel:systems weblogic server mp1scope:eqversion:10.0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise hrmsscope:eqversion:8.9

Trust: 0.3

vendor:oraclemodel:audit vaultscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:beamodel:systems weblogic portal sp4scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:oraclemodel:e-business suitescope:eqversion:12.0.6

Trust: 0.3

vendor:oraclemodel:outside in sdk html exportscope:eqversion:8.3

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.8

Trust: 0.3

vendor:oraclemodel:oracle11g standard editionscope:eqversion:11.16

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:beamodel:systems weblogic server sp7scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:outside in sdk html exportscope:eqversion:8.2.2

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

sources: ZDI: ZDI-09-017 // BID: 34461 // JVNDB: JVNDB-2009-001235 // CNNVD: CNNVD-200904-311 // NVD: CVE-2009-0993

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0993
value: HIGH

Trust: 1.0

NVD: CVE-2009-0993
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200904-311
value: HIGH

Trust: 0.6

VULMON: CVE-2009-0993
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0993
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2009-0993 // JVNDB: JVNDB-2009-001235 // CNNVD: CNNVD-200904-311 // NVD: CVE-2009-0993

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2009-0993

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 76656 // PACKETSTORM: 76710 // CNNVD: CNNVD-200904-311

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200904-311

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001235

PATCH

title:cpuapr2009url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

Trust: 1.5

title:090417_86url:http://www.oracle.com/technology/global/jp/security/090417_86/top.html

Trust: 0.8

title:TA09-105Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta09-105a.html

Trust: 0.8

title:Oracle Application Server Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156679

Trust: 0.6

sources: ZDI: ZDI-09-017 // JVNDB: JVNDB-2009-001235 // CNNVD: CNNVD-200904-311

EXTERNAL IDS

db:NVDid:CVE-2009-0993

Trust: 3.5

db:ZDIid:ZDI-09-017

Trust: 2.9

db:SECUNIAid:34693

Trust: 2.7

db:USCERTid:TA09-105A

Trust: 2.6

db:SECTRACKid:1022055

Trust: 2.4

db:BIDid:34461

Trust: 2.0

db:XFid:50030

Trust: 0.8

db:VUPENid:ADV-2009-1042

Trust: 0.8

db:JVNDBid:JVNDB-2009-001235

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-248

Trust: 0.7

db:CNNVDid:CNNVD-200904-311

Trust: 0.6

db:VULMONid:CVE-2009-0993

Trust: 0.1

db:SECUNIAid:35135

Trust: 0.1

db:PACKETSTORMid:77574

Trust: 0.1

db:PACKETSTORMid:76656

Trust: 0.1

db:PACKETSTORMid:76710

Trust: 0.1

db:PACKETSTORMid:76704

Trust: 0.1

sources: ZDI: ZDI-09-017 // VULMON: CVE-2009-0993 // BID: 34461 // JVNDB: JVNDB-2009-001235 // PACKETSTORM: 77574 // PACKETSTORM: 76656 // PACKETSTORM: 76710 // PACKETSTORM: 76704 // CNNVD: CNNVD-200904-311 // NVD: CVE-2009-0993

REFERENCES

url:http://www.securitytracker.com/id?1022055

Trust: 2.5

url:http://secunia.com/advisories/34693

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta09-105a.html

Trust: 2.5

url:http://www.zerodayinitiative.com/advisories/zdi-09-017

Trust: 1.8

url:http://www.securityfocus.com/bid/34461

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50030

Trust: 1.7

url:http://www.securityfocus.com/archive/1/502683/100/0/threaded

Trust: 1.7

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0993

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/50030

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-105a/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-11/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0993

Trust: 0.8

url:http://www.vupen.com/english/advisories/2009/1042

Trust: 0.8

url:http://www.zerodayinitiative.com/advisories/zdi-09-017/

Trust: 0.4

url:http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html

Trust: 0.4

url:http://www.red-database-security.com/advisory/apex_password_hashes.html

Trust: 0.4

url:http://secunia.com/secunia_research/2009-23/

Trust: 0.3

url:http://secunia.com/secunia_research/2009-22/

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2009-03.shtml

Trust: 0.3

url:http://www.oracle.com

Trust: 0.3

url:/archive/1/502845

Trust: 0.3

url:/archive/1/502707

Trust: 0.3

url:/archive/1/502697

Trust: 0.3

url:/archive/1/502727

Trust: 0.3

url:/archive/1/502723

Trust: 0.3

url:/archive/1/506160

Trust: 0.3

url:/archive/1/502724

Trust: 0.3

url:/archive/1/502683

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1001.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1002.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1003.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1004.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1005.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1006.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1012.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1016.html

Trust: 0.3

url:http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/34693/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/35135/

Trust: 0.1

url:http://www.good.com/faq/18431.html

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=799

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=800

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=801

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=798

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpua

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-105a.html>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/alerts.htm>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/pdf/public_vuln_to_advisory_mapping.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

sources: ZDI: ZDI-09-017 // VULMON: CVE-2009-0993 // BID: 34461 // JVNDB: JVNDB-2009-001235 // PACKETSTORM: 77574 // PACKETSTORM: 76656 // PACKETSTORM: 76710 // PACKETSTORM: 76704 // CNNVD: CNNVD-200904-311 // NVD: CVE-2009-0993

CREDITS

Joxean Koret

Trust: 0.7

sources: ZDI: ZDI-09-017

SOURCES

db:ZDIid:ZDI-09-017
db:VULMONid:CVE-2009-0993
db:BIDid:34461
db:JVNDBid:JVNDB-2009-001235
db:PACKETSTORMid:77574
db:PACKETSTORMid:76656
db:PACKETSTORMid:76710
db:PACKETSTORMid:76704
db:CNNVDid:CNNVD-200904-311
db:NVDid:CVE-2009-0993

LAST UPDATE DATE

2024-11-23T19:30:07.975000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-017date:2009-04-14T00:00:00
db:VULMONid:CVE-2009-0993date:2018-10-10T00:00:00
db:BIDid:34461date:2009-09-01T16:22:00
db:JVNDBid:JVNDB-2009-001235date:2009-05-20T00:00:00
db:CNNVDid:CNNVD-200904-311date:2021-07-14T00:00:00
db:NVDid:CVE-2009-0993date:2024-11-21T01:01:24.867

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-017date:2009-04-14T00:00:00
db:VULMONid:CVE-2009-0993date:2009-04-15T00:00:00
db:BIDid:34461date:2009-04-09T00:00:00
db:JVNDBid:JVNDB-2009-001235date:2009-05-20T00:00:00
db:PACKETSTORMid:77574date:2009-05-18T15:35:49
db:PACKETSTORMid:76656date:2009-04-15T00:10:45
db:PACKETSTORMid:76710date:2009-04-15T23:15:44
db:PACKETSTORMid:76704date:2009-04-15T15:08:54
db:CNNVDid:CNNVD-200904-311date:2009-04-15T00:00:00
db:NVDid:CVE-2009-0993date:2009-04-15T10:30:00.687