ID

VAR-201204-0084


CVE

CVE-2011-3071


TITLE

Used in multiple products Webkit Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-002013

DESCRIPTION

Use-after-free vulnerability in the HTMLMediaElement implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. This vulnerability Webkit Vulnerability in Google Chrome Other than Webkit Products that use may also be affected.Service disruption by a third party (DoS) You may be put into a state or affected by other details. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the library's implementation of a HTMLMedia element. After a source element is created, an attacker can catch the beforeLoad event before the element is used, and delete the element. The pointer to the source element will then be referenced causing a use-after-free condition, which can lead to code execution under the context of the application. Webkit is prone to a remote code-execution vulnerability due to a use-after-free error. Note: This issue was previously discussed in BID 52913 (Google Chrome Prior to 18.0.1025.151 Multiple Security Vulnerabilities) but has been given its own record to better document it. Google Chrome is a web browser developed by Google (Google). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-07-25-1 Safari 6.0 Safari 6.0 is now available and addresses the following: Safari Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of feed:// URLs. This update removes handling of feed:// URLs. CVE-ID CVE-2012-0678 : Masato Kinugawa Safari Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may cause files from the user's system to be sent to a remote server Description: An access control issue existed in the handling of feed:// URLs. This update removes handling of feed:// URLs. CVE-ID CVE-2012-0679 : Aaron Sigel of vtty.com Safari Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Passwords may autocomplete even when the site specifies that autocomplete should be disabled Description: Password input elements with the autocomplete attribute set to "off" were being autocompleted. This update addresses the issue by improved handling of the autocomplete attribute. CVE-ID CVE-2012-0680 : Dan Poltawski of Moodle Safari Downloads Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Opening maliciously crafted files on certain websites may lead to a cross-site scripting attack Description: An issue existed in Safari's support for the 'attachment' value for the HTTP Content-Disposition header. This header is used by many websites to serve files that were uploaded to the site by a third-party, such as attachments in web-based e-mail applications. Any script in files served with this header value would run as if the file had been served inline, with full access to other resources on the origin server. This issue is addressed by downloading resources served with this header, rather than displaying them inline. CVE-ID CVE-2011-3426 : Mickey Shkatov of laplinker.com, Kyle Osborn, Hidetake Jo at Microsoft and Microsoft Vulnerability Research (MSVR) WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling. CVE-ID CVE-2011-3016 : miaubiz CVE-2011-3021 : Arthur Gerkis CVE-2011-3027 : miaubiz CVE-2011-3032 : Arthur Gerkis CVE-2011-3034 : Arthur Gerkis CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis CVE-2011-3036 : miaubiz CVE-2011-3037 : miaubiz CVE-2011-3038 : miaubiz CVE-2011-3039 : miaubiz CVE-2011-3040 : miaubiz CVE-2011-3041 : miaubiz CVE-2011-3042 : miaubiz CVE-2011-3043 : miaubiz CVE-2011-3044 : Arthur Gerkis CVE-2011-3050 : miaubiz CVE-2011-3053 : miaubiz CVE-2011-3059 : Arthur Gerkis CVE-2011-3060 : miaubiz CVE-2011-3064 : Atte Kettunen of OUSPG CVE-2011-3068 : miaubiz CVE-2011-3069 : miaubiz CVE-2011-3071 : pa_kt working with HP's Zero Day Initiative CVE-2011-3073 : Arthur Gerkis CVE-2011-3074 : Slawomir Blazek CVE-2011-3075 : miaubiz CVE-2011-3076 : miaubiz CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team CVE-2011-3081 : miaubiz CVE-2011-3086 : Arthur Gerkis CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz CVE-2011-3090 : Arthur Gerkis CVE-2011-3913 : Arthur Gerkis CVE-2011-3924 : Arthur Gerkis CVE-2011-3926 : Arthur Gerkis CVE-2011-3958 : miaubiz CVE-2011-3966 : Aki Helin of OUSPG CVE-2011-3968 : Arthur Gerkis CVE-2011-3969 : Arthur Gerkis CVE-2011-3971 : Arthur Gerkis CVE-2012-0682 : Apple Product Security CVE-2012-0683 : Dave Mandelin of Mozilla CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-3589 : Dave Mandelin of Mozilla CVE-2012-3590 : Apple Product Security CVE-2012-3591 : Apple Product Security CVE-2012-3592 : Apple Product Security CVE-2012-3593 : Apple Product Security CVE-2012-3594 : miaubiz CVE-2012-3595 : Martin Barbella of Google Chrome Security CVE-2012-3596 : Skylined of the Google Chrome Security Team CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3600 : David Levin of the Chromium development community CVE-2012-3603 : Apple Product Security CVE-2012-3604 : Skylined of the Google Chrome Security Team CVE-2012-3605 : Cris Neckar of the Google Chrome Security team CVE-2012-3608 : Skylined of the Google Chrome Security Team CVE-2012-3609 : Skylined of the Google Chrome Security Team CVE-2012-3610 : Skylined of the Google Chrome Security Team CVE-2012-3611 : Apple Product Security CVE-2012-3615 : Stephen Chenney of the Chromium development community CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team CVE-2012-3625 : Skylined of Google Chrome Security Team CVE-2012-3626 : Apple Product Security CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team CVE-2012-3628 : Apple Product Security CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3640 : miaubiz CVE-2012-3641 : Slawomir Blazek CVE-2012-3642 : miaubiz CVE-2012-3644 : miaubiz CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3655 : Skylined of the Google Chrome Security Team CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2012-3661 : Apple Product Security CVE-2012-3663 : Skylined of Google Chrome Security Team CVE-2012-3664 : Thomas Sepez of the Chromium development community CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3666 : Apple CVE-2012-3667 : Trevor Squires of propaneapp.com CVE-2012-3668 : Apple Product Security CVE-2012-3669 : Apple Product Security CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis CVE-2012-3674 : Skylined of Google Chrome Security Team CVE-2012-3678 : Apple Product Security CVE-2012-3679 : Chris Leary of Mozilla CVE-2012-3680 : Skylined of Google Chrome Security Team CVE-2012-3681 : Apple CVE-2012-3682 : Adam Barth of the Google Chrome Security Team CVE-2012-3683 : wushi of team509 working with iDefense VCP CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing) WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Dragging and dropping selected text on a web page may lead to a cross-site information disclosure Description: A cross-origin issue existed in the handling of drag and drop events. This issue is addressed through improved origin tracking. CVE-ID CVE-2012-3689 : David Bloom of Cue WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Dragging and dropping selected text on a web page may cause files from the user's system to be sent to a remote server Description: An access control issue existed in the handling of drag and drop events. This issue is addressed through improved origin tracking. CVE-ID CVE-2012-3690 : David Bloom of Cue WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to a cross- site disclosure of information Description: A cross-origin issue existed in the handling of CSS property values. This issue is addressed through improved origin tracking. CVE-ID CVE-2012-3691 : Apple WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: A malicious website may be able to replace the contents of an iframe on another site Description: A cross-origin issue existed in the handling of iframes in popup windows. This issue is addressed through improved origin tracking. CVE-ID CVE-2011-3067 : Sergey Glazunov WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to a cross- site disclosure of information Description: A cross-origin issue existed in the handling of iframes and fragment identifiers. This issue is addressed through improved origin tracking. CVE-ID CVE-2012-2815 : Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, and Dan Boneh of the Stanford University Security Laboratory WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Look-alike characters in a URL could be used to masquerade a website Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could have been used to create a URL which contains look-alike characters. These could have been used in a malicious website to direct the user to a spoofed site that visually appears to be a legitimate domain. This issue is addressed by supplementing WebKit's list of known look-alike characters. Look- alike characters are rendered in Punycode in the address bar. CVE-ID CVE-2012-3693 : Matt Cooley of Symantec WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Dragging and dropping a file to Safari may reveal the filesystem path of the file to the website Description: An information disclosure issue existed in the handling of dragged files. This issue is addressed through improved handling of dragged files. CVE-ID CVE-2012-3694 : Daniel Cheng of Google, Aaron Sigel of vtty.com WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A canonicalization issue existed in the handling of URLs. This may have led to cross-site scripting on sites which use the location.href property. This issue is addressed through improved canonicalization of URLs. CVE-ID CVE-2012-3695 : Masato Kinugawa WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to HTTP request splitting Description: An HTTP header injection issue existed in the handling of WebSockets. This issue is addressed through improved WebSockets URI sanitization. CVE-ID CVE-2012-3696 : David Belcher of the BlackBerry Security Incident Response Team WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: A maliciously crafted website may be able to spoof the value in the URL bar Description: A state management issue existed in the handling of session history. Navigations to a fragment on the current page may cause Safari to display incorrect information in the URL bar. This issue is addressed through improved session state tracking. CVE-ID CVE-2011-2845 : Jordi Chancel WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: An attacker may be able to escape the sandbox and access any file the current user has access to Description: An access control issue existed in the handling of file URLs. An attacker who gains arbitrary code execution in a Safari WebProcess may be able to bypass the sandbox and access any file that the user running Safari has access to. This issue is addressed through improved handling of file URLs. CVE-ID CVE-2012-3697 : Aaron Sigel of vtty.com WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted website may lead to the disclosure of the disclosure of memory contents Description: An uninitialized memory access issue existed in the handling of SVG images. This issue is addressed through improved memory initialization. CVE-ID CVE-2012-3650 : Apple Safari 6.0 is available via the Apple Software Update application. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJQDy1eAAoJEPefwLHPlZEwJRQP/RJ41oMUhox0171MDfV4rs/h 7PpoGz3ZfIijyzy6KlF6mqdJqy/Oh/iGSJlCxhrboZZWPsgvtCQ7DoNC9p5akeH8 +h5ygcEbNm/bus/MDc0nHtHtXwcRGDLhdKtT6Kf5FUIa/lDUZbPOoe/H0/jQ5ROW DzIXImuioV2rskQvQVXMlKNVkaxLleStU84bBUwH+cCVNj5u9nWPQ7nLbptCzzG/ aL4t8MLAjkqJc/c3/a5fdqzveY0N21rkVceBeJuY5F+ejtPVCIUhqdIYzQXmZNst r5aEp1hvuyvFj00T/OT7otW52+cNnXwPOU/h/aT29S6ur9cP0mbvshMDhkESe5dv HjCRrBlkRlWQiS9u8SMwALLsI83Btk/UN5FNRe2rhtMD6O56B0RecZ14R/Uu6GEl IDRg72AwVq6NO0hFc+z9xoYrvLnmkD1mTq6HiNVbreFsOwyu/psKPwJsUpYJL+gS 5/u/Nh4XVnbK+MpXwpL22w3kzk8zoYazGmh+5B1DdevazjpKkXxj2l/MRxDEI/AE pYsgA2EwYpQeow6T69MjCuoiGK9EXSNs3bc6rsd/9WLvEedbGS2SnFYnHIO226cl OwENb/iR7hIm4JEB9pgLFRxvaWMOQVCuTDXKnnQkXPYNvUYUt4I9IZcURVDNlr+5 R4Tyq4x4MZg/D3Ho0YqS =K1+I -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-1524-1 August 08, 2012 webkit vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Multiple security vulnerabilities were fixed in WebKit. Software Description: - webkit: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKit browser and JavaScript engines. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: libjavascriptcoregtk-1.0-0 1.8.1-0ubuntu0.12.04.1 libjavascriptcoregtk-3.0-0 1.8.1-0ubuntu0.12.04.1 libwebkitgtk-1.0-0 1.8.1-0ubuntu0.12.04.1 libwebkitgtk-3.0-0 1.8.1-0ubuntu0.12.04.1 After a standard system update you need to restart your session to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1524-1 CVE-2011-3046, CVE-2011-3050, CVE-2011-3067, CVE-2011-3068, CVE-2011-3069, CVE-2011-3071, CVE-2011-3073, CVE-2011-3074, CVE-2011-3075, CVE-2011-3078, CVE-2012-0672, CVE-2012-3615, CVE-2012-3655, CVE-2012-3656, CVE-2012-3680, https://launchpad.net/bugs/1027283 Package Information: https://launchpad.net/ubuntu/+source/webkit/1.8.1-0ubuntu0.12.04.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ZDI-12-191 : Webkit HTMLMedia Element beforeLoad Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-191 December 21, 2012 - -- CVE ID: CVE-2011-3071 - -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P - -- Affected Vendors: WebKit.Org - -- Affected Products: WebKit.Org WebKit - -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 12492. - -- Vendor Response: WebKit.Org has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT1222 - -- Disclosure Timeline: 2012-03-14 - Vulnerability reported to vendor 2012-12-21 - Coordinated public release of advisory - -- Credit: This vulnerability was discovered by: * pa_kt / twitter.com/pa_kt - -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201204-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: April 10, 2012 Bugs: #410963 ID: 201204-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Background ========== Chromium is an open source web browser project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 18.0.1025.151 >= 18.0.1025.151 Description =========== Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A remote attacker could entice a user to open a specially crafted web site using Chromium, possibly resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or bypass of the same origin policy. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-18.0.1025.151" References ========== [ 1 ] CVE-2011-3066 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066 [ 2 ] CVE-2011-3067 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067 [ 3 ] CVE-2011-3068 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068 [ 4 ] CVE-2011-3069 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069 [ 5 ] CVE-2011-3070 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070 [ 6 ] CVE-2011-3071 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071 [ 7 ] CVE-2011-3072 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072 [ 8 ] CVE-2011-3073 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073 [ 9 ] CVE-2011-3074 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074 [ 10 ] CVE-2011-3075 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075 [ 11 ] CVE-2011-3076 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076 [ 12 ] CVE-2011-3077 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077 [ 13 ] Release Notes 18.0.1025.151 http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-= updates.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201204-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 3.06

sources: NVD: CVE-2011-3071 // JVNDB: JVNDB-2012-002013 // ZDI: ZDI-12-191 // BID: 57027 // VULHUB: VHN-51016 // PACKETSTORM: 115018 // PACKETSTORM: 115375 // PACKETSTORM: 116534 // PACKETSTORM: 119009 // PACKETSTORM: 111738

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:ltversion:18.0.1025.151

Trust: 1.8

vendor:applemodel:itunesscope:ltversion:10.7

Trust: 1.8

vendor:applemodel:iphone osscope:ltversion:6.0

Trust: 1.0

vendor:applemodel:safariscope:ltversion:6.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.9

vendor:applemodel:iosscope:ltversion:6 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6 (iphone 3gs or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6 (ipod touch first 4 after generation )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.0 (mac os)

Trust: 0.8

vendor:webkitmodel:webkitscope: - version: -

Trust: 0.7

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.145

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.148

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.51

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.132

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.133

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.140

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.147

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:18.0.1025.146

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:neversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.7

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.x

Trust: 0.3

vendor:webkitmodel:open source project webkit r105591scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r77705scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:webkitmodel:open source project webkit r82222scope: - version: -

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

sources: ZDI: ZDI-12-191 // BID: 57027 // JVNDB: JVNDB-2012-002013 // CNNVD: CNNVD-201204-030 // NVD: CVE-2011-3071

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3071
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3071
value: HIGH

Trust: 0.8

ZDI: CVE-2011-3071
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201204-030
value: HIGH

Trust: 0.6

VULHUB: VHN-51016
value: MEDIUM

Trust: 0.1

NVD: CVE-2011-3071
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.5

nvd@nist.gov: CVE-2011-3071
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-51016
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-12-191 // VULHUB: VHN-51016 // JVNDB: JVNDB-2012-002013 // CNNVD: CNNVD-201204-030 // NVD: CVE-2011-3071

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-51016 // JVNDB: JVNDB-2012-002013 // NVD: CVE-2011-3071

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 115375 // PACKETSTORM: 119009 // CNNVD: CNNVD-201204-030

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201204-030

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002013

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-51016

PATCH

title:HT5400url:http://support.apple.com/kb/HT5400

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503

Trust: 0.8

title:HT5485url:http://support.apple.com/kb/HT5485

Trust: 0.8

title:HT5400url:http://support.apple.com/kb/HT5400?viewlocale=ja_JP

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503?viewlocale=ja_JP

Trust: 0.8

title:HT5485url:http://support.apple.com/kb/HT5485?viewlocale=ja_JP

Trust: 0.8

title:Stable and Beta Channel Updatesurl:http://googlechromereleases.blogspot.jp/2012/04/stable-and-beta-channel-updates.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:WebKit.Org has issued an update to correct this vulnerability.url:http://support.apple.com/kb/HT1222

Trust: 0.7

title:Google Chrome Remediation measures for releasing exploitsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=114603

Trust: 0.6

sources: ZDI: ZDI-12-191 // JVNDB: JVNDB-2012-002013 // CNNVD: CNNVD-201204-030

EXTERNAL IDS

db:NVDid:CVE-2011-3071

Trust: 4.0

db:SECUNIAid:48732

Trust: 1.7

db:SECUNIAid:48749

Trust: 1.7

db:BIDid:52913

Trust: 1.7

db:SECTRACKid:1026892

Trust: 1.7

db:OSVDBid:81041

Trust: 1.7

db:ZDIid:ZDI-12-191

Trust: 1.1

db:JVNDBid:JVNDB-2012-002013

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1528

Trust: 0.7

db:CNNVDid:CNNVD-201204-030

Trust: 0.6

db:BIDid:57027

Trust: 0.4

db:PACKETSTORMid:119009

Trust: 0.2

db:VULHUBid:VHN-51016

Trust: 0.1

db:PACKETSTORMid:115018

Trust: 0.1

db:PACKETSTORMid:115375

Trust: 0.1

db:PACKETSTORMid:116534

Trust: 0.1

db:PACKETSTORMid:111738

Trust: 0.1

sources: ZDI: ZDI-12-191 // VULHUB: VHN-51016 // BID: 57027 // JVNDB: JVNDB-2012-002013 // PACKETSTORM: 115018 // PACKETSTORM: 115375 // PACKETSTORM: 116534 // PACKETSTORM: 119009 // PACKETSTORM: 111738 // CNNVD: CNNVD-201204-030 // NVD: CVE-2011-3071

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html

Trust: 2.0

url:http://security.gentoo.org/glsa/glsa-201204-03.xml

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2012/jul/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00003.html

Trust: 1.7

url:http://www.securityfocus.com/bid/52913

Trust: 1.7

url:http://code.google.com/p/chromium/issues/detail?id=118273

Trust: 1.7

url:http://support.apple.com/kb/ht5400

Trust: 1.7

url:http://support.apple.com/kb/ht5485

Trust: 1.7

url:http://support.apple.com/kb/ht5503

Trust: 1.7

url:http://osvdb.org/81041

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15317

Trust: 1.7

url:http://www.securitytracker.com/id?1026892

Trust: 1.7

url:http://secunia.com/advisories/48732

Trust: 1.7

url:http://secunia.com/advisories/48749

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74631

Trust: 1.7

url:http://support.apple.com/kb/ht1222

Trust: 1.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3071

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3071

Trust: 0.8

url:http://jvn.jp/cert/jvnvu624491/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu864819/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-3071

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-3074

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3075

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3068

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3069

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3073

Trust: 0.4

url:http://www.google.com/chrome

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2012/sep/msg00001.html

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-191/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3067

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3050

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3059

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3035

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3027

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3016

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3060

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3038

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3036

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3064

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3043

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3041

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3021

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3032

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3040

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3044

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3037

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3053

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3034

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3042

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3039

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3078

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3076

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2845

Trust: 0.1

url:https://launchpad.net/bugs/1027283

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1524-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3680

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3615

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit/1.8.1-0ubuntu0.12.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3046

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-12-191

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3066

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3072

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3073

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3070

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3075

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3074

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3077

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3076

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3077

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3066

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-=

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3069

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3067

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3068

Trust: 0.1

sources: ZDI: ZDI-12-191 // VULHUB: VHN-51016 // BID: 57027 // JVNDB: JVNDB-2012-002013 // PACKETSTORM: 115018 // PACKETSTORM: 115375 // PACKETSTORM: 116534 // PACKETSTORM: 119009 // PACKETSTORM: 111738 // CNNVD: CNNVD-201204-030 // NVD: CVE-2011-3071

CREDITS

pa_kt / twitter.com/pa_kt

Trust: 0.7

sources: ZDI: ZDI-12-191

SOURCES

db:ZDIid:ZDI-12-191
db:VULHUBid:VHN-51016
db:BIDid:57027
db:JVNDBid:JVNDB-2012-002013
db:PACKETSTORMid:115018
db:PACKETSTORMid:115375
db:PACKETSTORMid:116534
db:PACKETSTORMid:119009
db:PACKETSTORMid:111738
db:CNNVDid:CNNVD-201204-030
db:NVDid:CVE-2011-3071

LAST UPDATE DATE

2024-09-18T23:11:33.641000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-12-191date:2012-12-21T00:00:00
db:VULHUBid:VHN-51016date:2020-04-14T00:00:00
db:BIDid:57027date:2015-03-19T09:23:00
db:JVNDBid:JVNDB-2012-002013date:2013-04-03T00:00:00
db:CNNVDid:CNNVD-201204-030date:2020-04-15T00:00:00
db:NVDid:CVE-2011-3071date:2020-04-14T14:50:51.670

SOURCES RELEASE DATE

db:ZDIid:ZDI-12-191date:2012-12-21T00:00:00
db:VULHUBid:VHN-51016date:2012-04-05T00:00:00
db:BIDid:57027date:2012-04-05T00:00:00
db:JVNDBid:JVNDB-2012-002013date:2012-04-09T00:00:00
db:PACKETSTORMid:115018date:2012-07-25T23:01:01
db:PACKETSTORMid:115375date:2012-08-09T01:33:19
db:PACKETSTORMid:116534date:2012-09-14T02:13:11
db:PACKETSTORMid:119009date:2012-12-21T23:58:00
db:PACKETSTORMid:111738date:2012-04-11T14:21:31
db:CNNVDid:CNNVD-201204-030date:2010-04-06T00:00:00
db:NVDid:CVE-2011-3071date:2012-04-05T22:02:07.827