ID

VAR-201109-0183


CVE

CVE-2011-3490


TITLE

Measuresoft ScadaPro Arbitrary function call vulnerability

Trust: 0.8

sources: IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3676

DESCRIPTION

Multiple stack-based buffer overflows in service.exe in Measuresoft ScadaPro 4.0.0 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long command to port 11234, as demonstrated with the TF command. Measuresoft ScadaPro provides integrated data phone, monitoring, logging, report generation and more. Measuresoft ScadaPro has a security vulnerability. The \"xF\" command can be used to call any function in any DLL, such as executing the application via the \"system()\" function in msvcrt.dll. Measuresoft ScadaPro has a security vulnerability and sends a special \"RF\" command to TCP port 11234 to get arbitrary file content. Failed attempts will likely cause denial-of-service conditions

Trust: 5.67

sources: NVD: CVE-2011-3490 // JVNDB: JVNDB-2011-002240 // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 4.2

sources: IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673

AFFECTED PRODUCTS

vendor:easuresoftmodel:scadaproscope:eqversion:4.0.0.0

Trust: 4.0

vendor:measuresoftmodel:scadaproscope:lteversion:4.0.0

Trust: 1.8

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.11

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.10

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.13

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.15

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.12

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.9

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.6

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.14

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.8

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.7

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.6.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.2.8

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.8.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.9.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.2.9

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.1.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.6

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:4.0

Trust: 0.3

vendor:measuresoftmodel:scadaproscope:eqversion:0

Trust: 0.3

vendor:measuresoftmodel:scadaproscope:neversion:4.0.1

Trust: 0.3

vendor:scadapromodel: - scope:eqversion:2.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.6

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.6.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.8.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.9.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.1.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.2.8

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.2.9

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.6

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.7

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.8

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.9

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.10

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.11

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.12

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.13

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.14

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.15

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002240 // CNNVD: CNNVD-201109-263 // NVD: CVE-2011-3490

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3490
value: HIGH

Trust: 1.0

NVD: CVE-2011-3490
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201109-263
value: CRITICAL

Trust: 0.6

IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: a5093936-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-3490
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: a5093936-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-002240 // CNNVD: CNNVD-201109-263 // NVD: CVE-2011-3490

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2011-002240 // NVD: CVE-2011-3490

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201109-263

TYPE

Buffer overflow

Trust: 1.8

sources: IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201109-263

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002240

PATCH

title:scada-productsurl:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2011-002240

EXTERNAL IDS

db:BIDid:49613

Trust: 4.1

db:NVDid:CVE-2011-3490

Trust: 3.9

db:ICS CERT ALERTid:ICS-ALERT-11-256-04

Trust: 2.4

db:CNNVDid:CNNVD-201109-263

Trust: 1.8

db:EXPLOIT-DBid:17848

Trust: 1.6

db:SREASONid:8382

Trust: 1.0

db:CNVDid:CNVD-2011-3673

Trust: 0.8

db:CNVDid:CNVD-2011-3676

Trust: 0.8

db:CNVDid:CNVD-2011-3675

Trust: 0.8

db:CNVDid:CNVD-2011-3674

Trust: 0.8

db:CNVDid:CNVD-2011-3670

Trust: 0.8

db:OSVDBid:75486

Trust: 0.8

db:JVNDBid:JVNDB-2011-002240

Trust: 0.8

db:ICS CERTid:ICSA-11-263-01

Trust: 0.3

db:IVDid:82F0DC66-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7DE8A7B2-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7F9967D6-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:815B94A4-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:A5093936-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:86F8B360-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 82f0dc66-1f88-11e6-abef-000c29c66e3d // IVD: 7de8a7b2-1f88-11e6-abef-000c29c66e3d // IVD: 7f9967d6-1f88-11e6-abef-000c29c66e3d // IVD: 815b94a4-1f88-11e6-abef-000c29c66e3d // IVD: a5093936-2354-11e6-abef-000c29c66e3d // IVD: 86f8b360-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002240 // CNNVD: CNNVD-201109-263 // NVD: CVE-2011-3490

REFERENCES

url:http://aluigi.altervista.org/adv/scadapro_1-adv.txthttp

Trust: 3.0

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-04.pdf

Trust: 2.4

url:http://aluigi.altervista.org/adv/scadapro_1-adv.txt

Trust: 1.9

url:http://www.exploit-db.com/exploits/17848

Trust: 1.6

url:http://securityreason.com/securityalert/8382

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3490

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3490

Trust: 0.8

url:http://osvdb.org/75486

Trust: 0.8

url:http://www.securityfocus.com/bid/49613

Trust: 0.8

url:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.3

url:/archive/1/519637

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-263-01.pdf

Trust: 0.3

url:http://www.measuresoft.net/news/post/inaccurate-reports-of-measuresoft-scadapro-400-vulnerability.aspx

Trust: 0.3

sources: CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002240 // CNNVD: CNNVD-201109-263 // NVD: CVE-2011-3490

CREDITS

Luigi Auriemma

Trust: 0.3

sources: BID: 49613

SOURCES

db:IVDid:82f0dc66-1f88-11e6-abef-000c29c66e3d
db:IVDid:7de8a7b2-1f88-11e6-abef-000c29c66e3d
db:IVDid:7f9967d6-1f88-11e6-abef-000c29c66e3d
db:IVDid:815b94a4-1f88-11e6-abef-000c29c66e3d
db:IVDid:a5093936-2354-11e6-abef-000c29c66e3d
db:IVDid:86f8b360-1f88-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3670
db:CNVDid:CNVD-2011-3674
db:CNVDid:CNVD-2011-3676
db:CNVDid:CNVD-2011-3675
db:CNVDid:CNVD-2011-3673
db:BIDid:49613
db:JVNDBid:JVNDB-2011-002240
db:CNNVDid:CNNVD-201109-263
db:NVDid:CVE-2011-3490

LAST UPDATE DATE

2024-08-14T14:52:48.739000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3670date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3674date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3676date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3675date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3673date:2011-09-15T00:00:00
db:BIDid:49613date:2011-09-20T21:30:00
db:JVNDBid:JVNDB-2011-002240date:2011-09-26T00:00:00
db:CNNVDid:CNNVD-201109-263date:2011-09-19T00:00:00
db:NVDid:CVE-2011-3490date:2012-02-14T04:08:46.697

SOURCES RELEASE DATE

db:IVDid:82f0dc66-1f88-11e6-abef-000c29c66e3ddate:2011-09-15T00:00:00
db:IVDid:7de8a7b2-1f88-11e6-abef-000c29c66e3ddate:2011-09-15T00:00:00
db:IVDid:7f9967d6-1f88-11e6-abef-000c29c66e3ddate:2011-09-15T00:00:00
db:IVDid:815b94a4-1f88-11e6-abef-000c29c66e3ddate:2011-09-15T00:00:00
db:IVDid:a5093936-2354-11e6-abef-000c29c66e3ddate:2011-09-19T00:00:00
db:IVDid:86f8b360-1f88-11e6-abef-000c29c66e3ddate:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3670date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3674date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3676date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3675date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3673date:2011-09-15T00:00:00
db:BIDid:49613date:2011-09-13T00:00:00
db:JVNDBid:JVNDB-2011-002240date:2011-09-26T00:00:00
db:CNNVDid:CNNVD-201109-263date:2011-09-19T00:00:00
db:NVDid:CVE-2011-3490date:2011-09-16T14:28:12.997