ID

VAR-201003-0114


CVE

CVE-2009-3032


TITLE

Autonomy KeyView Filter SDK of kvolefio.dll Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-001844

DESCRIPTION

Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow. Autonomy KeyView module is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting this issue will allow an attacker to corrupt memory and cause denial-of-service conditions and may potentially allow the execution of arbitrary code in the context of an application using the module. Multiple products using the KeyView module are affected, including: Symantec Mail Security for Domino Symantec Mail Security for Microsoft Exchange Symantec Mail Security for SMTP Symantec Brightmail Gateway Symantec Data Loss Prevention Detection Servers Symantec Data Loss Prevention Endpoint Agents Symantec IM Manager. KeyView is a software package for exporting, converting and viewing files in various formats. For more information: SA38797 SOLUTION: Please see the vendor's advisory for a list of fixes. iDefense Security Advisory 03.04.10 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 04, 2010 I. BACKGROUND Autonomy KeyView SDK is a commercial SDK that provides many file format parsing libraries. It supports a large number of different document formats. KeyView is used by several popular vendors for processing documents. For more information, visit the URLs referenced below. http://www.autonomy.com/ II. This vulnerability occurs when processing specially crafted documents. When processing such a document, the software reads an integer value from the file and uses this integer, without validation, in an arithmetic operation to calculate the amount of memory to allocate. If a sufficiently large number is supplied, the calculation overflows, resulting in a buffer of insufficient size being allocated. The software then proceeds to copy data into this under-sized buffer. This results in an exploitable heap buffer overflow condition. III. ANALYSIS Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the targeted application. In order to exploit this vulnerability, an attacker must cause a specially crafted OLE file to be processed by an application using the Autonomy KeyView SDK. This includes file types such as PowerPoint, Excel, Word, as well as other document formats. The amount of user interaction required is tied to the way in which the KeyView SDK is used. In cases such as Lotus Notes, this requires that an attacker convince a user to view an e-mail attachment; however, in other cases, processing may take place automatically as a document is examined. The privileges that an attacker gains may be different for each application that uses the KeyView SDK. For example, exploiting this issue via Lotus Notes yields the current user's privileges while exploiting the vulnerability via Symantec Mail Security yields SYSTEM privileges. IV. All applications that utilize Autonomy's KeyView SDK to process untrusted content are also believed to be vulnerable. V. WORKAROUND For Symantec Mail Security, disabling "content filtering" will prevent exploitation. Unfortunately, disabling the affected "kvolefio.dll" library causes additional issues. Working around this issue by disabling filters would require all filters that utilize this module to be disabled. It is not clear at this time if this is even possible. iDefense will update this workaround once more information has been received from the vendor(s). VI. VENDOR RESPONSE Symantec Corporation has released a solution which addresses this issue. Information about downloadable vendor updates can be found by clicking on the URLs shown. http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00 VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-3032 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 09/28/2009 Initial Vendor Notification 09/28/2009 Initial Vendor Reply 03/04/2010 Coordinated Public Disclosure IX. CREDIT This vulnerability was discovered by Joshua J. Drake of iDefense Labs. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2010 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Autonomy KeyView OLE File Parsing Integer Overflow Vulnerability SECUNIA ADVISORY ID: SA38797 VERIFY ADVISORY: http://secunia.com/advisories/38797/ DESCRIPTION: iDefense Labs has reported a vulnerability in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is reported in version 10.5. Other versions may also be affected. SOLUTION: Do not open OLE files in applications using the vulnerable library. ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=858 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Trust: 2.34

sources: NVD: CVE-2009-3032 // JVNDB: JVNDB-2010-001844 // BID: 38468 // VULHUB: VHN-40478 // PACKETSTORM: 86952 // PACKETSTORM: 86956 // PACKETSTORM: 86946 // PACKETSTORM: 86954

AFFECTED PRODUCTS

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:10.0

Trust: 2.7

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:8.1.1

Trust: 2.4

vendor:symantecmodel:data loss prevention detection serversscope:eqversion:8.1.1

Trust: 1.6

vendor:symantecmodel:data loss prevention detection serversscope:eqversion:9.0.1

Trust: 1.6

vendor:symantecmodel:data loss prevention detection serversscope:eqversion:10.0

Trust: 1.6

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:9.0.1

Trust: 1.6

vendor:symantecmodel:brightmail gatewayscope:eqversion:8.0

Trust: 1.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5

Trust: 1.3

vendor:symantecmodel:mail securityscope:eqversion:6.0.6

Trust: 1.0

vendor:symantecmodel:im manager 2007scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.4.29

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.7

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.8

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.12

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.13

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:8.0

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.6

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.1.181

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:6.0.7

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:8.0.1

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.3.25

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:8.0.2

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.1.182

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.0

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.1.189

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:6.0.8

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:7.5.5.32

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:5.0.11

Trust: 1.0

vendor:ibmmodel:notesscope:eqversion:6.5.x

Trust: 0.8

vendor:ibmmodel:notesscope:eqversion:7.x

Trust: 0.8

vendor:ibmmodel:notesscope:ltversion:8.0.2 fp4

Trust: 0.8

vendor:ibmmodel:notesscope:ltversion:8.5.1 fp1

Trust: 0.8

vendor:ibmmodel:notesscope:ltversion:8.5.2

Trust: 0.8

vendor:symantecmodel:brightmail gatewayscope:lteversion:8.x

Trust: 0.8

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:9.x

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(linux) 10.0

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(linux) 8.1.1

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(linux) 9.x

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(windows) 10.0

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(windows) 8.1.1

Trust: 0.8

vendor:symantecmodel:data loss prevention enforce/detection serversscope:eqversion:(windows) 9.x

Trust: 0.8

vendor:symantecmodel:im manager 2007scope:eqversion:8.x

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.3.25

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.4.29

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.5.32

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.6

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.7

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 7.5.8

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 8.0

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 8.0.1

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(domino) 8.0.2

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 5.0.10

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 5.0.11

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 5.0.12

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 5.0.13

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 6.0.6

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 6.0.7

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 6.0.8

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(exchange) 6.0.9

Trust: 0.8

vendor:symantecmodel:mail securityscope:eqversion:(smtp) (eol) 5.0.x

Trust: 0.8

vendor:symantecmodel:im manager 2007scope: - version: -

Trust: 0.6

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1205

Trust: 0.3

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1201

Trust: 0.3

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1200

Trust: 0.3

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1189

Trust: 0.3

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1182

Trust: 0.3

vendor:symantecmodel:mail security for smtp patchscope:eqversion:5.0.1181

Trust: 0.3

vendor:symantecmodel:mail security for smtpscope:eqversion:5.0.1

Trust: 0.3

vendor:symantecmodel:mail security for smtpscope:eqversion:5.0

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.0.9

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.0.8

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.0.7

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.0.6

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:5.0.13

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:5.0.12

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:5.0.11

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:5.0.10.382

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:5.0.10

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:8.0.2

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:8.0.1

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.8

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.7

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.6

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.325

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:8.0

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.5.32

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.4.29

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:eqversion:7.5.3.25

Trust: 0.3

vendor:symantecmodel:im managerscope:eqversion:8.4

Trust: 0.3

vendor:symantecmodel:im managerscope:eqversion:8.3

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:9.0.2

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:8.1

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:eqversion:9.0.2

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:eqversion:8.1.1

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:eqversion:9.0.2

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:eqversion:8.1.1

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:data loss prevention detection serversscope:eqversion:7.237

Trust: 0.3

vendor:symantecmodel:data loss prevention detection serversscope:eqversion:7.2

Trust: 0.3

vendor:symantecmodel:brightmail gatewayscope:eqversion:8.0.2

Trust: 0.3

vendor:symantecmodel:brightmail gatewayscope:eqversion:8.0.1

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:neversion:6.0.10

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:neversion:8.0.3

Trust: 0.3

vendor:symantecmodel:mail security for dominoscope:neversion:7.5.9

Trust: 0.3

vendor:symantecmodel:im managerscope:neversion:8.4.13

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:neversion:10.0.1010.18007

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:neversion:8.1.10.9

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:neversion:9.0.3

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:neversion:10.0.1010.18007

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:neversion:9.0.3

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:neversion:8.1.10.8

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:neversion:10.0.1010.18007

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:neversion:9.0.3

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:neversion:8.1.10.8

Trust: 0.3

vendor:symantecmodel:data loss prevention detection serversscope:neversion:7.2.40

Trust: 0.3

vendor:symantecmodel:brightmail gatewayscope:neversion:9.0

Trust: 0.3

sources: BID: 38468 // JVNDB: JVNDB-2010-001844 // CNNVD: CNNVD-201003-053 // NVD: CVE-2009-3032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3032
value: HIGH

Trust: 1.0

NVD: CVE-2009-3032
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201003-053
value: CRITICAL

Trust: 0.6

VULHUB: VHN-40478
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3032
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40478
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40478 // JVNDB: JVNDB-2010-001844 // CNNVD: CNNVD-201003-053 // NVD: CVE-2009-3032

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-40478 // JVNDB: JVNDB-2010-001844 // NVD: CVE-2009-3032

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 86946 // CNNVD: CNNVD-201003-053

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201003-053

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001844

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-40478

PATCH

title:Lotus Notes/Domino 8.5.1url:http://www-10.lotus.com/ldd%5CR5FixList.nsf/WhatsNew/61f6dc55689d10b18525774d0055319a?OpenDocument

Trust: 0.8

title:734173url:http://www-06.ibm.com/jp/domino04/lotus/support/faqs/faqs.nsf/all/734173

Trust: 0.8

title:1440812url:http://www-01.ibm.com/support/docview.wss?uid=swg21440812

Trust: 0.8

title:SYM10-006url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00

Trust: 0.8

sources: JVNDB: JVNDB-2010-001844

EXTERNAL IDS

db:NVDid:CVE-2009-3032

Trust: 2.9

db:BIDid:38468

Trust: 2.8

db:SECUNIAid:38823

Trust: 0.9

db:SECUNIAid:38797

Trust: 0.9

db:VUPENid:ADV-2010-0533

Trust: 0.8

db:VUPENid:ADV-2010-0534

Trust: 0.8

db:JVNDBid:JVNDB-2010-001844

Trust: 0.8

db:CNNVDid:CNNVD-201003-053

Trust: 0.7

db:NSFOCUSid:14591

Trust: 0.6

db:IDEFENSEid:20100304 AUTONOMY KEYVIEW OLE DOCUMENT INTEGER OVERFLOW VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:86946

Trust: 0.2

db:VULHUBid:VHN-40478

Trust: 0.1

db:PACKETSTORMid:86952

Trust: 0.1

db:SECUNIAid:38809

Trust: 0.1

db:PACKETSTORMid:86956

Trust: 0.1

db:PACKETSTORMid:86954

Trust: 0.1

sources: VULHUB: VHN-40478 // BID: 38468 // JVNDB: JVNDB-2010-001844 // PACKETSTORM: 86952 // PACKETSTORM: 86956 // PACKETSTORM: 86946 // PACKETSTORM: 86954 // CNNVD: CNNVD-201003-053 // NVD: CVE-2009-3032

REFERENCES

url:http://www.securityfocus.com/bid/38468

Trust: 2.5

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=858

Trust: 2.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21440812

Trust: 1.1

url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00

Trust: 1.0

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3032

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3032

Trust: 0.8

url:http://secunia.com/advisories/38823

Trust: 0.8

url:http://secunia.com/advisories/38797

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/0533

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/0534

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14591

Trust: 0.6

url:http://www.autonomy.com/content/products/keyview/index.en.html

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:http://secunia.com/advisories/38797/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00

Trust: 0.1

url:http://secunia.com/advisories/38823/

Trust: 0.1

url:http://secunia.com/advisories/38809/

Trust: 0.1

url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20100304_00

Trust: 0.1

url:http://www.autonomy.com/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3032

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

sources: VULHUB: VHN-40478 // BID: 38468 // JVNDB: JVNDB-2010-001844 // PACKETSTORM: 86952 // PACKETSTORM: 86956 // PACKETSTORM: 86946 // PACKETSTORM: 86954 // CNNVD: CNNVD-201003-053 // NVD: CVE-2009-3032

CREDITS

Joshua J. Drake

Trust: 0.6

sources: CNNVD: CNNVD-201003-053

SOURCES

db:VULHUBid:VHN-40478
db:BIDid:38468
db:JVNDBid:JVNDB-2010-001844
db:PACKETSTORMid:86952
db:PACKETSTORMid:86956
db:PACKETSTORMid:86946
db:PACKETSTORMid:86954
db:CNNVDid:CNNVD-201003-053
db:NVDid:CVE-2009-3032

LAST UPDATE DATE

2024-11-23T23:10:11.585000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40478date:2013-02-07T00:00:00
db:BIDid:38468date:2010-03-05T08:02:00
db:JVNDBid:JVNDB-2010-001844date:2010-08-19T00:00:00
db:CNNVDid:CNNVD-201003-053date:2010-03-05T00:00:00
db:NVDid:CVE-2009-3032date:2024-11-21T01:06:21.393

SOURCES RELEASE DATE

db:VULHUBid:VHN-40478date:2010-03-05T00:00:00
db:BIDid:38468date:2010-03-04T00:00:00
db:JVNDBid:JVNDB-2010-001844date:2010-08-19T00:00:00
db:PACKETSTORMid:86952date:2010-03-06T07:32:04
db:PACKETSTORMid:86956date:2010-03-06T07:32:15
db:PACKETSTORMid:86946date:2010-03-05T21:18:30
db:PACKETSTORMid:86954date:2010-03-06T07:32:09
db:CNNVDid:CNNVD-201003-053date:2010-03-05T00:00:00
db:NVDid:CVE-2009-3032date:2010-03-05T19:30:00.313