ID

VAR-200911-0390


CVE

CVE-2009-3384


TITLE

Apple Safari of WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2009-002395

DESCRIPTION

Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply. WebKit is prone to multiple remote code-execution, denial-of-service, and information-disclosure vulnerabilities. An attacker may exploit these issues by enticing victims into connecting to a malicious FTP server. WebKit is an open source browser web page layout engine. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA37346 VERIFY ADVISORY: http://secunia.com/advisories/37346/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system. 1) An integer overflow error when processing ColorSync profiles embedded in images can be exploited to potentially execute arbitrary code. For more information see vulnerability #4 in: SA36701 2) An error exists when handling an "Open Image in New Tab", "Open Image in New Window", or "Open Link in New Tab" shortcut menu action performed on a link to a local file. This can be exploited to load a local HTML file and disclose sensitive information by tricking a user into performing the affected actions within a specially crafted webpage. 3) An error exists in WebKit when sending "preflight" requests originating from a page in a different origin. This can be exploited to facilitate cross-site request forgery attacks by injecting custom HTTP headers. 5) An error in WebKit when handling an HTML 5 Media Element on Mac OS X can be exploited to bypass remote image loading restrictions via e.g. HTML-formatted emails. NOTE: Some errors leading to crashes, caused by the included libxml2 library, have also been reported. SOLUTION: Update to version 4.0.4. PROVIDED AND/OR DISCOVERED BY: 1-3, 5) Reported by the vendor. 4) The vendor credits Michal Zalewski of Google Inc. ORIGINAL ADVISORY: http://support.apple.com/kb/HT3949 OTHER REFERENCES: SA36701: http://secunia.com/advisories/36701/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . For more information: SA37346 SOLUTION: Do not browse untrusted sites with an application using Qt components based on WebKit. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: SUSE update for Multiple Packages SECUNIA ADVISORY ID: SA43068 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43068/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 RELEASE DATE: 2011-01-25 DISCUSS ADVISORY: http://secunia.com/advisories/43068/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43068/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: SUSE has issued an update for multiple packages, which fixes multiple vulnerabilities

Trust: 2.34

sources: NVD: CVE-2009-3384 // JVNDB: JVNDB-2009-002395 // BID: 36995 // VULHUB: VHN-40830 // PACKETSTORM: 82605 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:0.8

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:0.9

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3_417.9.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0_pre

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4_419.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4_beta

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.0

vendor:applemodel:safariscope:lteversion:4.0.3

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 3.1.2

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 3.1.2

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0.4

Trust: 0.8

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.6

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4.0.4

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.1.3

Trust: 0.3

sources: BID: 36995 // JVNDB: JVNDB-2009-002395 // CNNVD: CNNVD-200911-151 // NVD: CVE-2009-3384

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3384
value: HIGH

Trust: 1.0

NVD: CVE-2009-3384
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200911-151
value: CRITICAL

Trust: 0.6

VULHUB: VHN-40830
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3384
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2009-3384
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-40830
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40830 // JVNDB: JVNDB-2009-002395 // CNNVD: CNNVD-200911-151 // NVD: CVE-2009-3384

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2009-3384

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200911-151

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200911-151

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002395

PATCH

title:HT3949url:http://support.apple.com/kb/HT3949

Trust: 0.8

title:HT4013url:http://support.apple.com/kb/HT4013

Trust: 0.8

title:HT4013url:http://support.apple.com/kb/HT4013?viewlocale=ja_JP

Trust: 0.8

title:HT3949url:http://support.apple.com/kb/HT3949?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2009-002395

EXTERNAL IDS

db:NVDid:CVE-2009-3384

Trust: 2.8

db:BIDid:36995

Trust: 2.2

db:SECUNIAid:37346

Trust: 2.0

db:SECTRACKid:1023166

Trust: 1.9

db:OSVDBid:59943

Trust: 1.9

db:VUPENid:ADV-2009-3217

Trust: 1.9

db:SECUNIAid:37393

Trust: 1.2

db:SECUNIAid:43068

Trust: 1.2

db:SECUNIAid:37397

Trust: 1.2

db:VUPENid:ADV-2011-0212

Trust: 1.1

db:XFid:54241

Trust: 0.8

db:JVNDBid:JVNDB-2009-002395

Trust: 0.8

db:CNNVDid:CNNVD-200911-151

Trust: 0.7

db:APPLEid:APPLE-SA-2009-11-11-1

Trust: 0.6

db:FEDORAid:FEDORA-2009-11487

Trust: 0.6

db:FEDORAid:FEDORA-2009-11491

Trust: 0.6

db:VULHUBid:VHN-40830

Trust: 0.1

db:PACKETSTORMid:82605

Trust: 0.1

db:PACKETSTORMid:82635

Trust: 0.1

db:PACKETSTORMid:97846

Trust: 0.1

db:PACKETSTORMid:82630

Trust: 0.1

sources: VULHUB: VHN-40830 // BID: 36995 // JVNDB: JVNDB-2009-002395 // PACKETSTORM: 82605 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630 // CNNVD: CNNVD-200911-151 // NVD: CVE-2009-3384

REFERENCES

url:http://www.securityfocus.com/bid/36995

Trust: 1.9

url:http://osvdb.org/59943

Trust: 1.9

url:http://www.securitytracker.com/id?1023166

Trust: 1.9

url:http://secunia.com/advisories/37346

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/3217

Trust: 1.9

url:http://support.apple.com/kb/ht3949

Trust: 1.8

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00549.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00001.html

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=525788

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00545.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010/feb/msg00000.html

Trust: 1.1

url:http://support.apple.com/kb/ht4013

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6362

Trust: 1.1

url:http://secunia.com/advisories/37393

Trust: 1.1

url:http://secunia.com/advisories/37397

Trust: 1.1

url:http://secunia.com/advisories/43068

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/54241

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3384

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/54241

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3384

Trust: 0.8

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://www.apple.com/safari/

Trust: 0.3

url:http://secunia.com/advisories/business_solutions/

Trust: 0.3

url:http://secunia.com/advisories/37346/

Trust: 0.2

url:http://secunia.com/advisories/37393/

Trust: 0.2

url:http://secunia.com/advisories/36701/

Trust: 0.1

url:http://trac.webkit.org/changeset/47494

Trust: 0.1

url:http://trac.webkit.org/changeset/48725

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43068

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/43068/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/43068/

Trust: 0.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00546.html

Trust: 0.1

url:http://secunia.com/advisories/37397/

Trust: 0.1

sources: VULHUB: VHN-40830 // BID: 36995 // JVNDB: JVNDB-2009-002395 // PACKETSTORM: 82605 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630 // CNNVD: CNNVD-200911-151 // NVD: CVE-2009-3384

CREDITS

Secunia

Trust: 0.4

sources: PACKETSTORM: 82605 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630

SOURCES

db:VULHUBid:VHN-40830
db:BIDid:36995
db:JVNDBid:JVNDB-2009-002395
db:PACKETSTORMid:82605
db:PACKETSTORMid:82635
db:PACKETSTORMid:97846
db:PACKETSTORMid:82630
db:CNNVDid:CNNVD-200911-151
db:NVDid:CVE-2009-3384

LAST UPDATE DATE

2024-08-14T12:55:46.791000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40830date:2017-09-19T00:00:00
db:BIDid:36995date:2015-04-16T17:48:00
db:JVNDBid:JVNDB-2009-002395date:2010-02-25T00:00:00
db:CNNVDid:CNNVD-200911-151date:2009-11-13T00:00:00
db:NVDid:CVE-2009-3384date:2017-09-19T01:29:36.250

SOURCES RELEASE DATE

db:VULHUBid:VHN-40830date:2009-11-13T00:00:00
db:BIDid:36995date:2009-11-11T00:00:00
db:JVNDBid:JVNDB-2009-002395date:2010-01-07T00:00:00
db:PACKETSTORMid:82605date:2009-11-16T09:29:40
db:PACKETSTORMid:82635date:2009-11-16T10:41:50
db:PACKETSTORMid:97846date:2011-01-25T03:59:20
db:PACKETSTORMid:82630date:2009-11-16T09:30:46
db:CNNVDid:CNNVD-200911-151date:2009-11-13T00:00:00
db:NVDid:CVE-2009-3384date:2009-11-13T15:30:00.627