ID

VAR-201204-0228


CVE

CVE-2012-1180


TITLE

nginx Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-002086

DESCRIPTION

Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request. nginx is prone to an information-disclosure vulnerability. Attackers can exploit this issue to harvest sensitive information that may lead to further attacks. BUGTRAQ ID: 52578 CVE ID: CVE-2012-1180 nginx is a widely used high-performance web server. There is an information disclosure vulnerability in nginx's implementation of processing malformed HTTP responses from upstream servers. 0 nginx 1.0.9 nginx 1.0.8 nginx 1.0.10 Vendor patch: Igor Sysoev ----------- At present, the vendor has released an upgrade patch to fix this security problem, please go to the vendor's homepage to download: http ://nginx.net/. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201203-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: nginx: Multiple vulnerabilities Date: March 28, 2012 Bugs: #293785, #293786, #293788, #389319, #408367 ID: 201203-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in nginx, the worst of which may allow execution of arbitrary code. Background ========== nginx is a robust, small, and high performance HTTP and reverse proxy server. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/nginx < 1.0.14 >= 1.0.14 Description =========== Multiple vulnerabilities have been found in nginx: * The TLS protocol does not properly handle session renegotiation requests (CVE-2009-3555). * The "ngx_http_process_request_headers()" function in ngx_http_parse.c could cause a NULL pointer dereference (CVE-2009-3896). * nginx does not properly sanitize user input for the the WebDAV COPY or MOVE methods (CVE-2009-3898). * The "ngx_resolver_copy()" function in ngx_resolver.c contains a boundary error which could cause a heap-based buffer overflow (CVE-2011-4315). * nginx does not properly parse HTTP header responses which could expose sensitive information (CVE-2012-1180). Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the nginx process, cause a Denial of Service condition, create or overwrite arbitrary files, or obtain sensitive information. Workaround ========== There is no known workaround at this time. Resolution ========== All nginx users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.0.14" References ========== [ 1 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 2 ] CVE-2009-3896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896 [ 3 ] CVE-2009-3898 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898 [ 4 ] CVE-2011-4315 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315 [ 5 ] CVE-2012-1180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201203-22.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:043 http://www.mandriva.com/security/ _______________________________________________________________________ Package : nginx Date : March 29, 2012 Affected: 2010.1, 2011. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1180 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: 44b081cef04380c1b45336962f9e9c4a 2010.1/i586/nginx-0.8.41-1.1mdv2010.2.i586.rpm ba57a417d0064fb122694b5dacedb1dd 2010.1/SRPMS/nginx-0.8.41-1.1mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 0008b13952f6f57c14efabeba5fbc717 2010.1/x86_64/nginx-0.8.41-1.1mdv2010.2.x86_64.rpm ba57a417d0064fb122694b5dacedb1dd 2010.1/SRPMS/nginx-0.8.41-1.1mdv2010.2.src.rpm Mandriva Linux 2011: dd738ba12a2127a78731eabb19129045 2011/i586/nginx-1.0.5-1.1-mdv2011.0.i586.rpm 5ee13d12672c9cd141449bd0dc024479 2011/SRPMS/nginx-1.0.5-1.1.src.rpm Mandriva Linux 2011/X86_64: d4af6f92f3508722e79dad2a5d12f269 2011/x86_64/nginx-1.0.5-1.1-mdv2011.0.x86_64.rpm 5ee13d12672c9cd141449bd0dc024479 2011/SRPMS/nginx-1.0.5-1.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFPc/zbmqjQ0CJFipgRAsXqAKCDpT1SDD6heEKkG4xtUvKB19ofhgCgihpF qZLFGHfgElxAFfkUZ3nIlDw= =VETw -----END PGP SIGNATURE----- . For the stable distribution (squeeze), this problem has been fixed in version 0.7.67-3+squeeze2. For the unstable distribution (sid), this problem has been fixed in version 1.1.17-1. We recommend that you upgrade your nginx packages. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Debian update for nginx SECUNIA ADVISORY ID: SA48465 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48465/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48465 RELEASE DATE: 2012-03-20 DISCUSS ADVISORY: http://secunia.com/advisories/48465/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48465/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48465 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Debian has issued an update for nginx. This fixes a weakness, which can be exploited by malicious people to disclose certain sensitive information. For more information: SA48366 SOLUTION: Apply updated packages via the apt-get package manager. ORIGINAL ADVISORY: DSA-2434-1: http://www.debian.org/security/2012/dsa-2434 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.43

sources: NVD: CVE-2012-1180 // JVNDB: JVNDB-2012-002086 // BID: 52578 // VULHUB: VHN-54461 // PACKETSTORM: 111273 // PACKETSTORM: 111370 // PACKETSTORM: 111001 // PACKETSTORM: 111045 // PACKETSTORM: 111263

AFFECTED PRODUCTS

vendor:f5model:nginxscope:ltversion:1.0.14

Trust: 1.0

vendor:f5model:nginxscope:gteversion:1.1.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:17

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:15

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:f5model:nginxscope:gteversion:0.1.0

Trust: 1.0

vendor:f5model:nginxscope:ltversion:1.1.17

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:16

Trust: 1.0

vendor:igor sysoevmodel:nginxscope:ltversion:1.1.x

Trust: 0.8

vendor:igor sysoevmodel:nginxscope:eqversion:1.1.17

Trust: 0.8

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.44

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.45

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.43

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.41

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.39

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.40

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.46

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.42

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.48

Trust: 0.6

vendor:igor sysoevmodel:nginxscope:eqversion:0.7.47

Trust: 0.6

vendor:igormodel:sysoev nginxscope:eqversion:1.0.10

Trust: 0.3

vendor:igormodel:sysoev nginxscope:eqversion:1.0.9

Trust: 0.3

vendor:igormodel:sysoev nginxscope:eqversion:1.0.8

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:igormodel:sysoev nginxscope:neversion:1.1.17

Trust: 0.3

vendor:igormodel:sysoev nginxscope:neversion:1.0.14

Trust: 0.3

sources: BID: 52578 // JVNDB: JVNDB-2012-002086 // CNNVD: CNNVD-201203-375 // NVD: CVE-2012-1180

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1180
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1180
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-375
value: MEDIUM

Trust: 0.6

VULHUB: VHN-54461
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1180
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-54461
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-54461 // JVNDB: JVNDB-2012-002086 // CNNVD: CNNVD-201203-375 // NVD: CVE-2012-1180

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-54461 // JVNDB: JVNDB-2012-002086 // NVD: CVE-2012-1180

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-375

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201203-375

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002086

PATCH

title:FEDORA-2012-4006url:http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076671.html

Trust: 0.8

title:FEDORA-2012-3991url:http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076646.html

Trust: 0.8

title:FEDORA-2012-3846url:http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077966.html

Trust: 0.8

title:Changeset 4530url:http://trac.nginx.org/nginx/changeset/4530/nginx

Trust: 0.8

title:Changeset 4531url:http://trac.nginx.org/nginx/changeset/4531/nginx

Trust: 0.8

title:patch.2012.memory.txturl:http://nginx.org/download/patch.2012.memory.txt

Trust: 0.8

title:nginx security advisoriesurl:http://nginx.org/en/security_advisories.html

Trust: 0.8

title:ngx_http_proxy_moduleurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=42980

Trust: 0.6

sources: JVNDB: JVNDB-2012-002086 // CNNVD: CNNVD-201203-375

EXTERNAL IDS

db:NVDid:CVE-2012-1180

Trust: 3.1

db:BIDid:52578

Trust: 2.0

db:SECUNIAid:48465

Trust: 1.8

db:SECUNIAid:48577

Trust: 1.8

db:SECTRACKid:1026827

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2012/03/15/5

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2012/03/15/9

Trust: 1.7

db:OSVDBid:80124

Trust: 1.7

db:JVNDBid:JVNDB-2012-002086

Trust: 0.8

db:CNNVDid:CNNVD-201203-375

Trust: 0.6

db:PACKETSTORMid:111001

Trust: 0.2

db:PACKETSTORMid:111370

Trust: 0.2

db:SEEBUGid:SSVID-60011

Trust: 0.1

db:VULHUBid:VHN-54461

Trust: 0.1

db:PACKETSTORMid:111273

Trust: 0.1

db:PACKETSTORMid:111045

Trust: 0.1

db:PACKETSTORMid:111263

Trust: 0.1

sources: VULHUB: VHN-54461 // BID: 52578 // JVNDB: JVNDB-2012-002086 // PACKETSTORM: 111273 // PACKETSTORM: 111370 // PACKETSTORM: 111001 // PACKETSTORM: 111045 // PACKETSTORM: 111263 // CNNVD: CNNVD-201203-375 // NVD: CVE-2012-1180

REFERENCES

url:http://www.debian.org/security/2012/dsa-2434

Trust: 2.4

url:http://www.securityfocus.com/bid/52578

Trust: 2.3

url:http://seclists.org/bugtraq/2012/mar/65

Trust: 2.0

url:http://trac.nginx.org/nginx/changeset/4530/nginx

Trust: 2.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=803856

Trust: 2.0

url:http://security.gentoo.org/glsa/glsa-201203-22.xml

Trust: 1.8

url:http://www.securitytracker.com/id?1026827

Trust: 1.7

url:http://secunia.com/advisories/48465

Trust: 1.7

url:http://secunia.com/advisories/48577

Trust: 1.7

url:http://osvdb.org/80124

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-april/077966.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-march/076646.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-march/076671.html

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2012:043

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2012/03/15/5

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2012/03/15/9

Trust: 1.7

url:http://nginx.org/download/patch.2012.memory.txt

Trust: 1.7

url:http://nginx.org/en/security_advisories.html

Trust: 1.7

url:http://trac.nginx.org/nginx/changeset/4531/nginx

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74191

Trust: 1.7

url:https://hermes.opensuse.org/messages/14173096

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1180

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1180

Trust: 0.8

url:http://nginx.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-1180

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1180

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4315

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4315

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48465

Trust: 0.1

url:http://secunia.com/advisories/48465/#comments

Trust: 0.1

url:http://secunia.com/advisories/48465/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48577

Trust: 0.1

url:http://secunia.com/advisories/48577/

Trust: 0.1

url:http://secunia.com/advisories/48577/#comments

Trust: 0.1

url:http://www.gentoo.org/security/en/glsa/glsa-201203-22.xml

Trust: 0.1

sources: VULHUB: VHN-54461 // BID: 52578 // JVNDB: JVNDB-2012-002086 // PACKETSTORM: 111273 // PACKETSTORM: 111370 // PACKETSTORM: 111001 // PACKETSTORM: 111045 // PACKETSTORM: 111263 // CNNVD: CNNVD-201203-375 // NVD: CVE-2012-1180

CREDITS

Matthew Daley

Trust: 0.3

sources: BID: 52578

SOURCES

db:VULHUBid:VHN-54461
db:BIDid:52578
db:JVNDBid:JVNDB-2012-002086
db:PACKETSTORMid:111273
db:PACKETSTORMid:111370
db:PACKETSTORMid:111001
db:PACKETSTORMid:111045
db:PACKETSTORMid:111263
db:CNNVDid:CNNVD-201203-375
db:NVDid:CVE-2012-1180

LAST UPDATE DATE

2024-08-14T12:20:09.168000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-54461date:2021-11-10T00:00:00
db:BIDid:52578date:2015-04-13T22:13:00
db:JVNDBid:JVNDB-2012-002086date:2012-06-12T00:00:00
db:CNNVDid:CNNVD-201203-375date:2023-05-18T00:00:00
db:NVDid:CVE-2012-1180date:2021-11-10T15:57:01.280

SOURCES RELEASE DATE

db:VULHUBid:VHN-54461date:2012-04-17T00:00:00
db:BIDid:52578date:2012-03-15T00:00:00
db:JVNDBid:JVNDB-2012-002086date:2012-04-19T00:00:00
db:PACKETSTORMid:111273date:2012-03-29T02:37:12
db:PACKETSTORMid:111370date:2012-03-30T00:15:51
db:PACKETSTORMid:111001date:2012-03-20T15:34:43
db:PACKETSTORMid:111045date:2012-03-21T07:16:12
db:PACKETSTORMid:111263date:2012-03-28T06:36:19
db:CNNVDid:CNNVD-201203-375date:2012-03-23T00:00:00
db:NVDid:CVE-2012-1180date:2012-04-17T21:55:01.227