ID

VAR-201001-0747


CVE

CVE-2009-4248


TITLE

Realnetworks RealPlayer Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2010-001054

DESCRIPTION

Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request. Realnetworks RealPlayer Contains a buffer overflow vulnerability.Skillfully crafted by a third party RTSP SET_PARAMETER The request can have an impact related to buffer overflow. RealPlayer SP, RealPlayer, and Helix Player are prone to multiple remote vulnerabilities, including heap- and stack-based buffer-overflow issues. A remote attacker could exploit these issues by crafting a file and enticing an unsuspecting user to open it using a vulnerable application. Successful exploits will allow the attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following are vulnerable: RealPlayer SP 1.0.0 through 1.0.1 RealPlayer 11 11.0.0 through 11.0.5 RealPlayer 10.5 6.0.12.1040 through 6.0.12.163, 6.0.12.1675, 6.0.12.1698, and 6.0.12.1741 RealPlayer 10 and 10.1 Helix Player 11.0.0 through 11.0.2. The product provides features for downloading/converting videos (in web pages), editing videos, managing media files, and more. ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: RealPlayer Multiple Vulnerabilities SECUNIA ADVISORY ID: SA38218 VERIFY ADVISORY: http://secunia.com/advisories/38218/ DESCRIPTION: Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a vulnerable system. 2) An unspecified error when processing GIF images can be exploited to cause a heap-based buffer overflow. 3) A vulnerability is caused due to an unspecified error related to HTTP chunk encoding. 5) An unspecified error when processing compressed GIF images can be exploited to cause a heap-based buffer overflow. 6) An unspecified error within the RealPlayer SMIL parsing can be exploited to cause a heap-based buffer overflow. 7) An unspecified error within the RealPlayer skin parsing can be exploited to cause a stack-based buffer overflow. 8) An unspecified error related to the RealPlayer ASM RuleBook can be exploited to cause an "array overflow". 10) Two vulnerabilities are caused due to errors within the processing of Internet Video Recording (IVR) files. Please see the vendor's advisory for details. http://service.real.com/realplayer/security/01192010_player/en/ PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Evgeny Legerov * anonymous persons working with iDEFENSE Labs * John Rambo and anonymous researchers working with TippingPoint's Zero Day Initiative ORIGINAL ADVISORY: http://service.real.com/realplayer/security/01192010_player/en/ OTHER REFERENCES: SA33810: http://secunia.com/advisories/33810/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. iDefense Security Advisory 02.01.10 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 01, 2010 I. BACKGROUND RealPlayer is an application for playing various media formats, developed by RealNetworks Inc. Since late 2003, Real Player has been based on the open-source Helix Player. More information can be found at the URLs shown. For more information, see the vendor's site found at the following links. http://www.real.com/realplayer.html http://helixcommunity.org/ II. This problem specifically exists in the CMediumBlockAllocator::Alloc method. When calculating the size of a memory allocation, an integer overflow occurs. This leads to heap corruption, which can result in the execution of arbitrary code. III. ANALYSIS Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the user executing Real Player. To be successful, an attacker must persuade a user to use Real Player to view specially crafted media. This could be accomplished via a Web page or direct link to the malicious media. IV. DETECTION iDefense has confirmed the existence of this vulnerability in Real Player versions 10.5 (build 6.0.12.883) and 11 (build 6.0.14.738) on Windows. Other versions may also be affected. WORKAROUND iDefense is currently unaware of any effective workaround for this issue. VI. VENDOR RESPONSE RealNetworks has released a patch which addresses this issue. Information about downloadable vendor updates can be found by clicking on the URLs shown. http://service.real.com/realplayer/security/01192010_player/en/ VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-4248 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/11/2008 Initial Contact 01/11/2009 Initial Response 02/01/2010 Coordinated public disclosure. IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2010 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. For more information: SA38218 SOLUTION: Updated packages are available via Red Hat Network

Trust: 2.25

sources: NVD: CVE-2009-4248 // JVNDB: JVNDB-2010-001054 // BID: 37880 // VULHUB: VHN-41694 // PACKETSTORM: 85439 // PACKETSTORM: 85842 // PACKETSTORM: 86184

AFFECTED PRODUCTS

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.1

Trust: 1.9

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.0

Trust: 1.6

vendor:realnetworksmodel:helix playerscope:eqversion:10.0

Trust: 1.6

vendor:realnetworksmodel:realplayerscope:eqversion:10.0

Trust: 1.6

vendor:realnetworksmodel:helix playerscope:eqversion:11.0.1

Trust: 1.6

vendor:realnetworksmodel:realplayerscope:eqversion:11.0

Trust: 1.6

vendor:realnetworksmodel:realplayerscope:eqversion:10.1

Trust: 1.6

vendor:realnetworksmodel:helix playerscope:eqversion:11.0.0

Trust: 1.6

vendor:realnetworksmodel:realplayer spscope:eqversion:1.0.1

Trust: 1.3

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.5

Trust: 1.3

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.4

Trust: 1.3

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.3

Trust: 1.3

vendor:realnetworksmodel:realplayerscope:eqversion:11.0.2

Trust: 1.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5

Trust: 1.3

vendor:realnetworksmodel:realplayer spscope:eqversion:1.0.0

Trust: 1.0

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:*

Trust: 1.0

vendor:realmodel:realnetworks realplayerscope:eqversion:(enterprise)

Trust: 0.8

vendor:realmodel:realnetworks realplayerscope:eqversion:10

Trust: 0.8

vendor:realmodel:realnetworks realplayerscope:eqversion:10.5

Trust: 0.8

vendor:realmodel:realnetworks realplayerscope:eqversion:11

Trust: 0.8

vendor:realmodel:realnetworks realplayerscope:eqversion:sp 1.0.0

Trust: 0.8

vendor:realmodel:realnetworks realplayerscope:eqversion:sp 1.0.1

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:realnetworksmodel:realplayer spscope:eqversion:1.0

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:1.7

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:1.6

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:1.5

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:1.2

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope:eqversion:1.1

Trust: 0.3

vendor:realnetworksmodel:realplayer enterprisescope: - version: -

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.331

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.503

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.481

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.412

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.396

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.352

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.325

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:1010.0.0.305

Trust: 0.3

vendor:realnetworksmodel:realplayer for mac osscope:eqversion:10

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.1.3114

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.9

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.8

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.7

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.6

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.5

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.4

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.3

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.2

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:1010.0.1

Trust: 0.3

vendor:realnetworksmodel:realplayer for linuxscope:eqversion:10

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1741

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1698

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1675

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1663

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1483

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1348

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1235

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1069

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1059

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1056

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1053

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:10.5v6.0.12.1040

Trust: 0.3

vendor:realnetworksmodel:realplayerscope:eqversion:11

Trust: 0.3

sources: BID: 37880 // JVNDB: JVNDB-2010-001054 // CNNVD: CNNVD-201001-251 // NVD: CVE-2009-4248

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-4248
value: HIGH

Trust: 1.0

NVD: CVE-2009-4248
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201001-251
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41694
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-4248
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41694
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-41694 // JVNDB: JVNDB-2010-001054 // CNNVD: CNNVD-201001-251 // NVD: CVE-2009-4248

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-41694 // JVNDB: JVNDB-2010-001054 // NVD: CVE-2009-4248

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 85842 // CNNVD: CNNVD-201001-251

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201001-251

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001054

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41694

PATCH

title:Releases Update to Address Security Vulnerabilitiesurl:http://service.real.com/realplayer/security/01192010_player/en

Trust: 0.8

title:セキュリティ脆弱性に対応するアップデートをリリースurl:http://service.real.com/realplayer/security/01192010_player/ja/

Trust: 0.8

title:RHSA-2010:0094url:http://rhn.redhat.com/errata/RHSA-2010-0094.html

Trust: 0.8

title:RealPlayerSPurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5472

Trust: 0.6

title:RealPlayerSPGoldurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5471

Trust: 0.6

title:RealPlayer11GOLDurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5474

Trust: 0.6

title:RealPlayer11GOLDurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5473

Trust: 0.6

sources: JVNDB: JVNDB-2010-001054 // CNNVD: CNNVD-201001-251

EXTERNAL IDS

db:NVDid:CVE-2009-4248

Trust: 2.9

db:BIDid:37880

Trust: 2.8

db:SECUNIAid:38218

Trust: 2.6

db:SECTRACKid:1023489

Trust: 2.5

db:VUPENid:ADV-2010-0178

Trust: 2.5

db:XFid:55801

Trust: 1.4

db:SECUNIAid:38450

Trust: 1.2

db:JVNDBid:JVNDB-2010-001054

Trust: 0.8

db:CNNVDid:CNNVD-201001-251

Trust: 0.7

db:MLISTid:[CLIENT-CVS] 20080117 CORE RTSPPROTOCOL.CPP,1.55.2.18,1.55.2.19

Trust: 0.6

db:MLISTid:[CLIENT-CVS] 20080117 CORE RTSPPROTOCOL.CPP,1.85,1.86

Trust: 0.6

db:MLISTid:[CLIENT-DEV] 20080117 CR: FIX FOR BUG 211210

Trust: 0.6

db:REDHATid:RHSA-2010:0094

Trust: 0.6

db:ZDIid:ZDI-10-010

Trust: 0.3

db:ZDIid:ZDI-10-008

Trust: 0.3

db:ZDIid:ZDI-10-006

Trust: 0.3

db:ZDIid:ZDI-10-005

Trust: 0.3

db:ZDIid:ZDI-10-007

Trust: 0.3

db:PACKETSTORMid:85842

Trust: 0.2

db:VULHUBid:VHN-41694

Trust: 0.1

db:PACKETSTORMid:85439

Trust: 0.1

db:PACKETSTORMid:86184

Trust: 0.1

sources: VULHUB: VHN-41694 // BID: 37880 // JVNDB: JVNDB-2010-001054 // PACKETSTORM: 85439 // PACKETSTORM: 85842 // PACKETSTORM: 86184 // CNNVD: CNNVD-201001-251 // NVD: CVE-2009-4248

REFERENCES

url:http://www.securityfocus.com/bid/37880

Trust: 2.5

url:http://securitytracker.com/id?1023489

Trust: 2.5

url:http://secunia.com/advisories/38218

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0178

Trust: 2.5

url:http://service.real.com/realplayer/security/01192010_player/en/

Trust: 2.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=561361

Trust: 1.7

url:https://helixcommunity.org/viewcvs/client/core/rtspprotocol.cpp?view=log#rev1.55.2.19

Trust: 1.7

url:https://helixcommunity.org/viewcvs/client/core/rtspprotocol.cpp?view=log#rev1.86

Trust: 1.7

url:http://lists.helixcommunity.org/pipermail/client-cvs/2008-january/003756.html

Trust: 1.7

url:http://lists.helixcommunity.org/pipermail/client-cvs/2008-january/003759.html

Trust: 1.7

url:http://lists.helixcommunity.org/pipermail/client-dev/2008-january/004591.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2010-0094.html

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/55801

Trust: 1.4

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10641

Trust: 1.1

url:http://secunia.com/advisories/38450

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55801

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4248

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4248

Trust: 0.8

url:http://blogs.sun.com/security/entry/cve_2009_4247_buffer_overflow

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=839

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=837

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=838

Trust: 0.3

url:http://www.realnetworks.com/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-005/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-006/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-007/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-008/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-010/

Trust: 0.3

url:/archive/1/509286

Trust: 0.3

url:/archive/1/509293

Trust: 0.3

url:/archive/1/509288

Trust: 0.3

url:/archive/1/509100

Trust: 0.3

url:/archive/1/509096

Trust: 0.3

url:/archive/1/509105

Trust: 0.3

url:/archive/1/509098

Trust: 0.3

url:/archive/1/509104

Trust: 0.3

url:http://secunia.com/advisories/38218/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/blog/71/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/33810/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4248

Trust: 0.1

url:http://helixcommunity.org/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://www.real.com/realplayer.html

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://secunia.com/advisories/38450/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2010-0094.html

Trust: 0.1

sources: VULHUB: VHN-41694 // BID: 37880 // JVNDB: JVNDB-2010-001054 // PACKETSTORM: 85439 // PACKETSTORM: 85842 // PACKETSTORM: 86184 // CNNVD: CNNVD-201001-251 // NVD: CVE-2009-4248

CREDITS

Evgeny Legerov, anonymous researchers working with iDEFENSE Labs, John Rambo, Peter Vreugdenhil working with TippingPoint's Zero Day Initiative, and anonymous researchers working with TippingPoint's Zero Day Initiative

Trust: 0.9

sources: BID: 37880 // CNNVD: CNNVD-201001-251

SOURCES

db:VULHUBid:VHN-41694
db:BIDid:37880
db:JVNDBid:JVNDB-2010-001054
db:PACKETSTORMid:85439
db:PACKETSTORMid:85842
db:PACKETSTORMid:86184
db:CNNVDid:CNNVD-201001-251
db:NVDid:CVE-2009-4248

LAST UPDATE DATE

2024-11-23T21:47:35.495000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-41694date:2017-09-19T00:00:00
db:BIDid:37880date:2010-07-13T20:27:00
db:JVNDBid:JVNDB-2010-001054date:2010-02-17T00:00:00
db:CNNVDid:CNNVD-201001-251date:2011-07-13T00:00:00
db:NVDid:CVE-2009-4248date:2024-11-21T01:09:14.763

SOURCES RELEASE DATE

db:VULHUBid:VHN-41694date:2010-01-25T00:00:00
db:BIDid:37880date:2010-01-20T00:00:00
db:JVNDBid:JVNDB-2010-001054date:2010-02-17T00:00:00
db:PACKETSTORMid:85439date:2010-01-20T16:00:34
db:PACKETSTORMid:85842date:2010-02-02T02:24:47
db:PACKETSTORMid:86184date:2010-02-11T10:10:16
db:CNNVDid:CNNVD-201001-251date:2010-01-25T00:00:00
db:NVDid:CVE-2009-4248date:2010-01-25T19:30:01.543