ID

VAR-201112-0114


CVE

CVE-2011-5046


TITLE

Microsoft Windows 7 Professional 64-bit Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-003599

DESCRIPTION

The Graphics Device Interface (GDI) in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted data, as demonstrated by a large height attribute of an IFRAME element rendered by Safari, aka "GDI Access Violation Vulnerability.". Microsoft Windows 7 Professional 64-bit of kernel-mode Driver win32k.sys Is Apple Safari Service disruption when using ( Memory corruption ) A vulnerability exists that could lead to state and arbitrary code execution.By a third party IFRAME Excessively large height Service operation disruption via attributes ( Memory corruption ) Could be put into a state and execute arbitrary code. Microsoft Windows is prone to a remote memory-corruption vulnerability. Successful exploits will result in the execution of arbitrary code in the kernel-mode. Failed attempts will cause a denial-of-service condition. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Microsoft Windows win32k.sys Memory Corruption Vulnerability SECUNIA ADVISORY ID: SA47237 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47237/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47237 RELEASE DATE: 2011-12-19 DISCUSS ADVISORY: http://secunia.com/advisories/47237/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47237/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47237 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page containing an IFRAME with an overly large "height" attribute viewed using the Apple Safari browser. The vulnerability is confirmed on a fully patched Windows 7 Professional 64-bit. Other versions may also be affected. SOLUTION: No effective solution is currently available. PROVIDED AND/OR DISCOVERED BY: webDEViL ORIGINAL ADVISORY: https://twitter.com/#!/w3bd3vil/status/148454992989261824 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA12-045A Microsoft Updates for Multiple Vulnerabilities Original release date: February 14, 2012 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft .NET Framework * Microsoft Silverlight * Microsoft Office * Microsoft Server Software Overview There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Silverlight, Office, and Microsoft Server Software. Microsoft has released updates to address these vulnerabilities. I. Description The Microsoft Security Bulletin Summary for February 2012 describes multiple vulnerabilities in Microsoft Windows. Microsoft has released updates to address the vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for February 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. IV. References * Microsoft Security Bulletin Summary for February 2012 - <https://technet.microsoft.com/en-us/security/bulletin/ms12-feb> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> * Microsoft Update - <https://www.update.microsoft.com/> * Microsoft Update Overview - <http://www.microsoft.com/security/updates/mu.aspx> * Turn Automatic Updating On or Off - <http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA12-045A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA12-045A Feedback VU#752838" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2012 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History February 14, 2012: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTzqp2T/GkGVXE7GMAQKh6wgAg9gjZ3sCu3eepRZEyFy4PkGhC4A1jzgw 2soH7tPOimgpzlLVbkJ7/RQYylCYixzEa9PbL9v/RzXh/TVVeXrPU97SqmLOAXr7 gtgcapZBGSHBmqYF5BWRnXVRVOQv+JpmdA5AJHO89qQl4okr9VVTCTnQkrAFyzfP 40uf/Nr0DrTRI9dmEjsLTzvOhh0G2HKnBmbpybGaOqoQao67ih/HEOkp6bsCUBwK joX4C3nK9EdMPNK8YAzrHNbM0ANR5DfieGXBsCwNi6/3zZvGB+PKhAu6bikbQrXW iRpyS3IirvDB59KNlmQp3jdaodNHSLOg5JuF7kOdQ1m8qa+DjwSvJQ== =E3Fg -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2011-5046 // JVNDB: JVNDB-2011-003599 // BID: 51122 // VULHUB: VHN-52991 // VULMON: CVE-2011-5046 // PACKETSTORM: 107984 // PACKETSTORM: 109763

AFFECTED PRODUCTS

vendor:microsoftmodel:windows server 2008scope:eqversion:r2

Trust: 1.6

vendor:microsoftmodel:windows server 2003scope:eqversion:sp2

Trust: 1.4

vendor:microsoftmodel:windows vistascope:eqversion:sp2

Trust: 1.4

vendor:microsoftmodel:windows server 2003scope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows xpscope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows vistascope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion:*

Trust: 1.0

vendor:applemodel:safariscope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x32) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x64) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(itanium) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x86) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(itanium) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(x64) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3 sp3

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.6

vendor:microsoftmodel:windows 7scope:eqversion:sp1

Trust: 0.6

vendor:microsoftmodel:windows server 2008scope:eqversion:sp2

Trust: 0.6

vendor:microsoftmodel:windows xpscope:eqversion:sp2

Trust: 0.6

vendor:microsoftmodel:windows server r2 sp1scope:eqversion:2008x64

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2008x640

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systemsscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systemsscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows ultimatescope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows home premiumscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows home premium sp1scope:eqversion:7-x64

Trust: 0.3

vendor:microsoftmodel:windows home premium sp1scope:eqversion:7-x32

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows rcscope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windowsscope:eqversion:7

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:communication server telephony managerscope:eqversion:10004.0

Trust: 0.3

vendor:avayamodel:communication server telephony managerscope:eqversion:10003.0

Trust: 0.3

vendor:avayamodel:callpilotscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:callpilotscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

sources: BID: 51122 // JVNDB: JVNDB-2011-003599 // CNNVD: CNNVD-201112-514 // NVD: CVE-2011-5046

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-5046
value: HIGH

Trust: 1.0

NVD: CVE-2011-5046
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201112-514
value: CRITICAL

Trust: 0.6

VULHUB: VHN-52991
value: HIGH

Trust: 0.1

VULMON: CVE-2011-5046
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-5046
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-52991
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-52991 // VULMON: CVE-2011-5046 // JVNDB: JVNDB-2011-003599 // CNNVD: CNNVD-201112-514 // NVD: CVE-2011-5046

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-52991 // JVNDB: JVNDB-2011-003599 // NVD: CVE-2011-5046

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201112-372 // CNNVD: CNNVD-201112-514

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201112-514

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003599

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-52991 // VULMON: CVE-2011-5046

PATCH

title:Safariurl:http://www.apple.com/jp/safari/

Trust: 0.8

title:Windows 7url:http://windows.microsoft.com/en-US/windows7/products/home

Trust: 0.8

title:MS12-008url:http://technet.microsoft.com/en-us/security/bulletin/ms12-008

Trust: 0.8

title:MS12-008url:http://technet.microsoft.com/ja-jp/security/bulletin/ms12-008

Trust: 0.8

title: - url:https://github.com/nitishbadole/oscp-note-2

Trust: 0.1

title:OSCPurl:https://github.com/H3n2yk/OSCP

Trust: 0.1

title: - url:https://github.com/rmsbpro/rmsbpro

Trust: 0.1

sources: VULMON: CVE-2011-5046 // JVNDB: JVNDB-2011-003599

EXTERNAL IDS

db:NVDid:CVE-2011-5046

Trust: 2.9

db:USCERTid:TA12-045A

Trust: 2.1

db:SECUNIAid:47237

Trust: 1.9

db:EXPLOIT-DBid:18275

Trust: 1.8

db:OSVDBid:77908

Trust: 1.8

db:SECTRACKid:1026450

Trust: 1.2

db:BIDid:51122

Trust: 1.1

db:JVNDBid:JVNDB-2011-003599

Trust: 0.8

db:CNNVDid:CNNVD-201112-514

Trust: 0.7

db:CNNVDid:CNNVD-201112-372

Trust: 0.6

db:XFid:71873

Trust: 0.6

db:XFid:32

Trust: 0.6

db:SEEBUGid:SSVID-72439

Trust: 0.1

db:VULHUBid:VHN-52991

Trust: 0.1

db:VULMONid:CVE-2011-5046

Trust: 0.1

db:PACKETSTORMid:107984

Trust: 0.1

db:PACKETSTORMid:109763

Trust: 0.1

sources: VULHUB: VHN-52991 // VULMON: CVE-2011-5046 // BID: 51122 // JVNDB: JVNDB-2011-003599 // PACKETSTORM: 107984 // PACKETSTORM: 109763 // CNNVD: CNNVD-201112-372 // CNNVD: CNNVD-201112-514 // NVD: CVE-2011-5046

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta12-045a.html

Trust: 2.0

url:http://www.exploit-db.com/exploits/18275

Trust: 1.8

url:http://osvdb.org/77908

Trust: 1.8

url:http://secunia.com/advisories/47237

Trust: 1.8

url:http://twitter.com/w3bd3vil/statuses/148454992989261824

Trust: 1.2

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-008

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14603

Trust: 1.2

url:http://www.securitytracker.com/id?1026450

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/71873

Trust: 1.2

url:https://twitter.com/#!/w3bd3vil/status/148454992989261824

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-5046

Trust: 0.8

url:http://www.jpcert.or.jp/at/2012/at120005.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta12-045a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5046

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.securityfocus.com/bid/51122

Trust: 0.7

url:http://xforce.iss.net/xforce/xfdb/71873

Trust: 0.6

url:http://www.microsoft.com

Trust: 0.3

url:http://blogs.technet.com/b/michaelkranawetter/archive/2011/12/23/update-windows-7-64-bi-version-amp-apple-safari-details-zur-schwachstelle.aspx

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100156772

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms11-008.mspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/18275/

Trust: 0.1

url:http://secunia.com/advisories/47237/

Trust: 0.1

url:http://secunia.com/advisories/47237/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47237

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://windows.microsoft.com/en-us/windows-vista/turn-automatic-updating-on-or-off>

Trust: 0.1

url:https://www.update.microsoft.com/>

Trust: 0.1

url:https://technet.microsoft.com/en-us/security/bulletin/ms12-feb>

Trust: 0.1

url:http://www.microsoft.com/security/updates/mu.aspx>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta12-045a.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULHUB: VHN-52991 // VULMON: CVE-2011-5046 // BID: 51122 // JVNDB: JVNDB-2011-003599 // PACKETSTORM: 107984 // PACKETSTORM: 109763 // CNNVD: CNNVD-201112-372 // CNNVD: CNNVD-201112-514 // NVD: CVE-2011-5046

CREDITS

webDEViL

Trust: 0.9

sources: BID: 51122 // CNNVD: CNNVD-201112-372

SOURCES

db:VULHUBid:VHN-52991
db:VULMONid:CVE-2011-5046
db:BIDid:51122
db:JVNDBid:JVNDB-2011-003599
db:PACKETSTORMid:107984
db:PACKETSTORMid:109763
db:CNNVDid:CNNVD-201112-372
db:CNNVDid:CNNVD-201112-514
db:NVDid:CVE-2011-5046

LAST UPDATE DATE

2024-08-14T12:26:13.535000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-52991date:2018-10-12T00:00:00
db:VULMONid:CVE-2011-5046date:2019-02-26T00:00:00
db:BIDid:51122date:2012-02-15T17:30:00
db:JVNDBid:JVNDB-2011-003599date:2012-02-16T00:00:00
db:CNNVDid:CNNVD-201112-372date:2011-12-21T00:00:00
db:CNNVDid:CNNVD-201112-514date:2012-01-04T00:00:00
db:NVDid:CVE-2011-5046date:2019-02-26T14:04:02.213

SOURCES RELEASE DATE

db:VULHUBid:VHN-52991date:2011-12-30T00:00:00
db:VULMONid:CVE-2011-5046date:2011-12-30T00:00:00
db:BIDid:51122date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003599date:2012-01-05T00:00:00
db:PACKETSTORMid:107984date:2011-12-19T02:17:36
db:PACKETSTORMid:109763date:2012-02-15T00:07:50
db:CNNVDid:CNNVD-201112-372date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201112-514date:2011-12-30T00:00:00
db:NVDid:CVE-2011-5046date:2011-12-30T19:55:01.297