ID

VAR-201108-0032


CVE

CVE-2011-0228


TITLE

Apple iOS Updates for vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2011-002113

DESCRIPTION

The Data Security component in Apple iOS before 4.2.10 and 4.3.x before 4.3.5 does not check the basicConstraints parameter during validation of X.509 certificate chains, which allows man-in-the-middle attackers to spoof an SSL server by using a non-CA certificate to sign a certificate for an arbitrary domain. Apple From iOS An update for has been released.By a third party SSL/TLS There is a possibility that the content being communicated on will be intercepted or tampered with. Apple iOS is prone to a security vulnerability that may allow attackers to capture or modify data. Successful exploits will allow attackers to gain access to sensitive information or send misleading information to a victim user. Other attacks are also possible. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. ---------------------------------------------------------------------- The Secunia Vulnerability Intelligence Manager (VIM) enables you to handle vulnerability threats in a simple, cost effective way. Read more and request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Apple iOS "basicConstraints" X.509 Certificate Chain Validation Vulnerability SECUNIA ADVISORY ID: SA45369 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45369/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45369 RELEASE DATE: 2011-07-27 DISCUSS ADVISORY: http://secunia.com/advisories/45369/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45369/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45369 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Apple iOS, which can be exploited by malicious people to conduct spoofing attacks. This can be exploited to spoof certificates of arbitrary domains and disclose encrypted information e.g. using a Man-in-the-Middle (MitM) attack. PROVIDED AND/OR DISCOVERED BY: Paul Kehrer, Trustwave's SpiderLabs. The vendor also credits Gregor Kopf, Recurity Labs on behalf of BSI. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4824 http://support.apple.com/kb/HT4825 Trustwave: https://www.trustwave.com/spiderlabs/advisories/TWSL2011-007.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Trustwave's SpiderLabs Security Advisory TWSL2011-007: iOS SSL Implementation Does Not Validate Certificate Chain https://www.trustwave.com/spiderlabs/advisories/TWSL2011-007.txt Published: 2011-07-25 Version: 1.0 Vendor: Apple (http://www.apple.com) Product: iOS Version affected: Versions Prior to 5.0b4, 4.3.5, and 4.2.10 Product description: iOS is Apple's mobile operating system for the iPhone, iPod Touch, and iPad hardware platforms. By signing a new certificate using a legitimate end entity certificate, an attacker can obtain a "valid" certificate for any domain. For example: -TrustedCA --somedomain.com (legitimate certificate) ---api.someotherdomain.com (signed by somedomain.com) Using this technique any SSL traffic using the api.someotherdomain.com certificate can be intercepted and decrypted by the issuer. No notification of the invalid nature of the certificate is presented to the iOS user. This method allows for transparent man-in-the-middle attacks against encrypted iOS communications. Remediation Steps: Users should update to the latest version of iOS in order to address this issue. This vulnerability has been corrected in versions 5.0b4, 4.3.5, and 4.2.10. Revision History: 07/15/11 - Vulnerability Disclosed 07/25/11 - Patch Released 07/25/11 - Advisory Published References: 1. http://support.apple.com/kb/HT4824 2. http://support.apple.com/kb/HT4825 About Trustwave: Trustwave is the leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper compliance management software and other proprietary security solutions. Trustwave has helped thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructure, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, China and Australia. For more information, visit https://www.trustwave.com About Trustwave's SpiderLabs: SpiderLabs(R) is the advanced security team at Trustwave focused on application security, incident response, penetration testing, physical security and security research. The team has performed over a thousand incident investigations, thousands of penetration tests and hundreds of application security tests globally. In addition, the SpiderLabs Research team provides intelligence through bleeding-edge research and proof of concept tool development to enhance Trustwave's products and services. https://www.trustwave.com/spiderlabs Disclaimer: The information provided in this advisory is provided "as is" without warranty of any kind. Trustwave disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Trustwave or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Trustwave or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is STRICTLY PROHIBITED. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2011-07-25-2 iOS 4.2.10 Software Update for iPhone iOS 4.2.10 Software Update for iPhone is now available and addresses the following: Data Security Available for: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: A certificate chain validation issue existed in the handling of X.509 certificates. This issue is addressed through improved validation of X.509 certificate chains. CVE-ID CVE-2011-0228 : Gregor Kopf of Recurity Labs on behalf of BSI, and Paul Kehrer of Trustwave's SpiderLabs Installation note: This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone. The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes. After doing this, the update can be applied when your iPhone is docked to your computer. To check that the iPhone has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "4.2.10 (8E600)". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (Darwin) iQEcBAEBAgAGBQJOKaO4AAoJEGnF2JsdZQeeZJAH/AgzQw32cHPdHMZMufmeTx7C q0I1yzI+uF8HDERM8VfDg98rjVFbhcKKyeA1FNe1lGz79sIpo6Px4QubCRKyt2RW FbLYNGlWNreNodBr8FhAQcVqYbHLogD1O/Y+MVeU9i4pVfO6gXFfaMHWZkaZDlZd m9DLyPxAJ9uRtb9AYz3YL7Dp52YoW5yApSnpqV2dm5LE9L7ysvZ6inDOme0figAH v8+MDE18x1Caw3n0f2cWd6Sz9jqjvIodgp8iYWMEYnsRUZtFlFyxbSQSJFeFq1Ul y8N12gycPaWCJsqQyfFEruTcqHnV9kBVZV9TACT6UdtRkULXtsFEsqi6+8PI2mo= =yzpz -----END PGP SIGNATURE-----

Trust: 2.43

sources: NVD: CVE-2011-0228 // JVNDB: JVNDB-2011-002113 // BID: 48877 // VULHUB: VHN-48173 // VULMON: CVE-2011-0228 // PACKETSTORM: 103453 // PACKETSTORM: 103388 // PACKETSTORM: 103408 // PACKETSTORM: 103387

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:4.2.9

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.4

Trust: 1.0

vendor:applemodel:iosscope:ltversion:4.2.10 earlier

Trust: 0.8

vendor:applemodel:iosscope:ltversion:4.3.5 earlier

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:neversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:neversion:4.2.10

Trust: 0.3

sources: BID: 48877 // JVNDB: JVNDB-2011-002113 // CNNVD: CNNVD-201107-392 // NVD: CVE-2011-0228

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0228
value: HIGH

Trust: 1.0

NVD: CVE-2011-0228
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201107-392
value: HIGH

Trust: 0.6

VULHUB: VHN-48173
value: HIGH

Trust: 0.1

VULMON: CVE-2011-0228
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0228
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-48173
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48173 // VULMON: CVE-2011-0228 // JVNDB: JVNDB-2011-002113 // CNNVD: CNNVD-201107-392 // NVD: CVE-2011-0228

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-48173 // JVNDB: JVNDB-2011-002113 // NVD: CVE-2011-0228

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201107-392

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201107-392

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002113

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-48173

PATCH

title:About the security content of iOS 4.3.5 Software Update for iPhoneurl:http://support.apple.com/kb/HT4824

Trust: 0.8

title:About the security content of iOS 4.2.10 Software Update for iPhoneurl:http://support.apple.com/kb/HT4825

Trust: 0.8

title:isslfixurl:https://github.com/jan0/isslfix

Trust: 0.1

title: - url:https://github.com/CVEDB/PoC-List

Trust: 0.1

sources: VULMON: CVE-2011-0228 // JVNDB: JVNDB-2011-002113

EXTERNAL IDS

db:NVDid:CVE-2011-0228

Trust: 3.2

db:BIDid:48877

Trust: 2.9

db:SECUNIAid:45369

Trust: 2.7

db:SECTRACKid:1025837

Trust: 2.6

db:SREASONid:8361

Trust: 1.2

db:OSVDBid:74030

Trust: 0.8

db:JVNDBid:JVNDB-2011-002113

Trust: 0.8

db:CNNVDid:CNNVD-201107-392

Trust: 0.7

db:APPLEid:APPLE-SA-2011-07-25-1

Trust: 0.6

db:APPLEid:APPLE-SA-2011-07-25-2

Trust: 0.6

db:BUGTRAQid:20110725 TWSL2011-007: IOS SSL IMPLEMENTATION DOES NOT VALIDATE CERTIFICATE CHAIN

Trust: 0.6

db:NSFOCUSid:17343

Trust: 0.6

db:PACKETSTORMid:103408

Trust: 0.2

db:PACKETSTORMid:103388

Trust: 0.2

db:PACKETSTORMid:103387

Trust: 0.2

db:VULHUBid:VHN-48173

Trust: 0.1

db:VULMONid:CVE-2011-0228

Trust: 0.1

db:PACKETSTORMid:103453

Trust: 0.1

sources: VULHUB: VHN-48173 // VULMON: CVE-2011-0228 // BID: 48877 // JVNDB: JVNDB-2011-002113 // PACKETSTORM: 103453 // PACKETSTORM: 103388 // PACKETSTORM: 103408 // PACKETSTORM: 103387 // CNNVD: CNNVD-201107-392 // NVD: CVE-2011-0228

REFERENCES

url:http://www.securityfocus.com/bid/48877

Trust: 2.7

url:http://secunia.com/advisories/45369

Trust: 2.6

url:https://www.trustwave.com/spiderlabs/advisories/twsl2011-007.txt

Trust: 2.3

url:http://support.apple.com/kb/ht4824

Trust: 2.0

url:http://support.apple.com/kb/ht4825

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2011//jul/msg00005.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2011//jul/msg00004.html

Trust: 1.8

url:http://securitytracker.com/id?1025837

Trust: 1.8

url:http://www.securityfocus.com/archive/1/518982/100/0/threaded

Trust: 1.2

url:http://securityreason.com/securityalert/8361

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0228

Trust: 0.8

url:http://jvn.jp/cert/jvnvu633907

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0228

Trust: 0.8

url:http://osvdb.org/74030

Trust: 0.8

url:http://www.securitytracker.com/id?1025837

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/518982/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/17343

Trust: 0.6

url:http://www.apple.com

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://blog.thoughtcrime.org/sslsniff-anniversary-edition

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-0228

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://www.apple.com/itunes/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://github.com/jan0/isslfix

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/45369/#comments

Trust: 0.1

url:http://secunia.com/advisories/45369/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45369

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://www.trustwave.com/spiderlabs

Trust: 0.1

url:http://www.apple.com)

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://www.trustwave.com

Trust: 0.1

sources: VULHUB: VHN-48173 // VULMON: CVE-2011-0228 // BID: 48877 // JVNDB: JVNDB-2011-002113 // PACKETSTORM: 103453 // PACKETSTORM: 103388 // PACKETSTORM: 103408 // PACKETSTORM: 103387 // CNNVD: CNNVD-201107-392 // NVD: CVE-2011-0228

CREDITS

Gregor Kopf of Recurity Labs on behalf of BSI, and Paul Kehrer of Trustwave's SpiderLab

Trust: 0.9

sources: BID: 48877 // CNNVD: CNNVD-201107-392

SOURCES

db:VULHUBid:VHN-48173
db:VULMONid:CVE-2011-0228
db:BIDid:48877
db:JVNDBid:JVNDB-2011-002113
db:PACKETSTORMid:103453
db:PACKETSTORMid:103388
db:PACKETSTORMid:103408
db:PACKETSTORMid:103387
db:CNNVDid:CNNVD-201107-392
db:NVDid:CVE-2011-0228

LAST UPDATE DATE

2024-08-14T14:58:29.374000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-48173date:2018-10-10T00:00:00
db:VULMONid:CVE-2011-0228date:2018-10-10T00:00:00
db:BIDid:48877date:2011-07-26T16:00:00
db:JVNDBid:JVNDB-2011-002113date:2013-06-26T00:00:00
db:CNNVDid:CNNVD-201107-392date:2011-09-01T00:00:00
db:NVDid:CVE-2011-0228date:2018-10-10T20:09:28.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-48173date:2011-08-29T00:00:00
db:VULMONid:CVE-2011-0228date:2011-08-29T00:00:00
db:BIDid:48877date:2011-07-25T00:00:00
db:JVNDBid:JVNDB-2011-002113date:2011-08-18T00:00:00
db:PACKETSTORMid:103453date:2011-07-26T06:44:17
db:PACKETSTORMid:103388date:2011-07-25T19:58:09
db:PACKETSTORMid:103408date:2011-07-26T02:53:15
db:PACKETSTORMid:103387date:2011-07-25T19:55:17
db:CNNVDid:CNNVD-201107-392date:1900-01-01T00:00:00
db:NVDid:CVE-2011-0228date:2011-08-29T20:55:00.753