ID

VAR-201307-0175


CVE

CVE-2013-2249


TITLE

Apache HTTP Server of mod_session_dbd In the module mod_session_dbd.c Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2013-003491

DESCRIPTION

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors. Apache HTTP Server is prone to an unspecified remote security vulnerability. Little is known about this issue or its effects at this time. We will update this BID as more information emerges. Apache HTTP Server versions prior to 2.4.6 are vulnerable. The server is fast, reliable and extensible through a simple API. An attacker could exploit this vulnerability for impact. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] httpd (SSA:2013-218-02) New httpd packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. Here are the details from the Slackware 14.0 ChangeLog: +--------------------------+ patches/packages/httpd-2.4.6-i486-1_slack14.0.txz: Upgraded. This update addresses two security issues: * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 12.1: ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/httpd-2.2.25-i486-1_slack12.1.tgz Updated package for Slackware 12.2: ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/httpd-2.2.25-i486-1_slack12.2.tgz Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/httpd-2.2.25-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/httpd-2.2.25-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/httpd-2.2.25-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/httpd-2.2.25-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/httpd-2.2.25-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/httpd-2.2.25-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.6-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.6-x86_64-1_slack14.0.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.6-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.6-x86_64-1.txz MD5 signatures: +-------------+ Slackware 12.1 package: 49e1243c36da3a80140ca7759d2f6dd8 httpd-2.2.25-i486-1_slack12.1.tgz Slackware 12.2 package: 467c75fe864bc88014e9501329a75285 httpd-2.2.25-i486-1_slack12.2.tgz Slackware 13.0 package: b96877782fd2f86204fdd3950b3a77bf httpd-2.2.25-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 392410fffbb3e4e4795e61a5b7d4fc50 httpd-2.2.25-x86_64-1_slack13.0.txz Slackware 13.1 package: 71a682673a4dcca9be050a4719accbf7 httpd-2.2.25-i486-1_slack13.1.txz Slackware x86_64 13.1 package: a76f23ceb9189ecb99c04b3b2d3e2e2d httpd-2.2.25-x86_64-1_slack13.1.txz Slackware 13.37 package: 704bccc4757c957a1ed30c4ffce19394 httpd-2.2.25-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 0cdea77935eeb983e368401856ec2e3c httpd-2.2.25-x86_64-1_slack13.37.txz Slackware 14.0 package: 37736614680f786b4cc0a8faa095d885 httpd-2.4.6-i486-1_slack14.0.txz Slackware x86_64 14.0 package: d8901630ba6ecfd020a53512c5f63fc8 httpd-2.4.6-x86_64-1_slack14.0.txz Slackware -current package: 649f30c4e51e6230fbe247664e0faa9c n/httpd-2.4.6-i486-1.txz Slackware x86_64 -current package: b3caf5504257c1172a2768ab114a9ee5 n/httpd-2.4.6-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg httpd-2.4.6-i486-1_slack14.0.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iEYEARECAAYFAlIAnpMACgkQakRjwEAQIjM10gCgkmtxZKnHyFXGi8CbGmy4LfRQ gL8AnjhciRUOBFU8ydK8gMvbfeZuU46c =TDGS -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-2249 // JVNDB: JVNDB-2013-003491 // BID: 61379 // VULHUB: VHN-62251 // VULMON: CVE-2013-2249 // PACKETSTORM: 122708

AFFECTED PRODUCTS

vendor:apachemodel:http serverscope:lteversion:2.4.4

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.4.1

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.4.5

Trust: 0.8

vendor:apachemodel:http serverscope:eqversion:2.4.4

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.3.10

Trust: 0.6

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.4.2

Trust: 0.3

sources: BID: 61379 // JVNDB: JVNDB-2013-003491 // CNNVD: CNNVD-201307-488 // NVD: CVE-2013-2249

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2249
value: HIGH

Trust: 1.0

NVD: CVE-2013-2249
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201307-488
value: HIGH

Trust: 0.6

VULHUB: VHN-62251
value: HIGH

Trust: 0.1

VULMON: CVE-2013-2249
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-2249
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-62251
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-62251 // VULMON: CVE-2013-2249 // JVNDB: JVNDB-2013-003491 // CNNVD: CNNVD-201307-488 // NVD: CVE-2013-2249

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-2249

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201307-488

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201307-488

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003491

PATCH

title:Contents of /httpd/httpd/trunk/modules/session/mod_session_dbd.curl:http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?diff_format=h&revision=1488158&view=markup

Trust: 0.8

title:Diff of /httpd/httpd/trunk/modules/session/mod_session_dbd.curl:http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h

Trust: 0.8

title:Changes with Apache 2.4.6url:http://www.apache.org/dist/httpd/CHANGES_2.4.6

Trust: 0.8

title:JSA10698url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698

Trust: 0.8

title:Apache HTTP Server mod_session_dbd Module mod_session_dbd.c Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145991

Trust: 0.6

title:Red Hat: CVE-2013-2249url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2013-2249

Trust: 0.1

title:ReconScanurl:https://github.com/GiJ03/ReconScan

Trust: 0.1

title:ReconScanurl:https://github.com/RoliSoft/ReconScan

Trust: 0.1

title:testurl:https://github.com/issdp/test

Trust: 0.1

title:ReconScanurl:https://github.com/kira1111/ReconScan

Trust: 0.1

title:DC-1-Vulnhub-Walkthroughurl:https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough

Trust: 0.1

title: - url:https://github.com/hrbrmstr/internetdb

Trust: 0.1

title:pigaturl:https://github.com/syadg123/pigat

Trust: 0.1

sources: VULMON: CVE-2013-2249 // JVNDB: JVNDB-2013-003491 // CNNVD: CNNVD-201307-488

EXTERNAL IDS

db:NVDid:CVE-2013-2249

Trust: 3.0

db:JUNIPERid:JSA10698

Trust: 1.7

db:JVNDBid:JVNDB-2013-003491

Trust: 0.8

db:CNNVDid:CNNVD-201307-488

Trust: 0.7

db:BIDid:61379

Trust: 0.4

db:SEEBUGid:SSVID-60913

Trust: 0.1

db:VULHUBid:VHN-62251

Trust: 0.1

db:VULMONid:CVE-2013-2249

Trust: 0.1

db:PACKETSTORMid:122708

Trust: 0.1

sources: VULHUB: VHN-62251 // VULMON: CVE-2013-2249 // BID: 61379 // JVNDB: JVNDB-2013-003491 // PACKETSTORM: 122708 // CNNVD: CNNVD-201307-488 // NVD: CVE-2013-2249

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-2249

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 1.6

url:http://www.apache.org/dist/httpd/changes_2.4.6

Trust: 1.1

url:https://httpd.apache.org/security/vulnerabilities_24.html

Trust: 1.1

url:http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h

Trust: 1.0

url:https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2249

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2249

Trust: 0.8

url:httpd.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3ccvs.

Trust: 0.6

url:httpd.apache.org/security/vulnerabilities_24.html

Trust: 0.6

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.

Trust: 0.6

url:httpd/changes_2.4.6

Trust: 0.6

url:http://www.apache.org/dist/

Trust: 0.6

url:https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs.

Trust: 0.6

url:httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h

Trust: 0.6

url:http://svn.apache.org/viewvc/

Trust: 0.6

url:https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3ccvs.

Trust: 0.6

url:http://httpd.apache.org/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 0.1

url:http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h

Trust: 0.1

url:https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1896

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1896

Trust: 0.1

sources: VULHUB: VHN-62251 // BID: 61379 // JVNDB: JVNDB-2013-003491 // PACKETSTORM: 122708 // CNNVD: CNNVD-201307-488 // NVD: CVE-2013-2249

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 61379

SOURCES

db:VULHUBid:VHN-62251
db:VULMONid:CVE-2013-2249
db:BIDid:61379
db:JVNDBid:JVNDB-2013-003491
db:PACKETSTORMid:122708
db:CNNVDid:CNNVD-201307-488
db:NVDid:CVE-2013-2249

LAST UPDATE DATE

2024-08-14T12:51:12.304000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-62251date:2017-01-07T00:00:00
db:VULMONid:CVE-2013-2249date:2021-06-06T00:00:00
db:BIDid:61379date:2015-05-07T17:17:00
db:JVNDBid:JVNDB-2013-003491date:2015-12-02T00:00:00
db:CNNVDid:CNNVD-201307-488date:2021-06-07T00:00:00
db:NVDid:CVE-2013-2249date:2023-11-07T02:14:59.577

SOURCES RELEASE DATE

db:VULHUBid:VHN-62251date:2013-07-23T00:00:00
db:VULMONid:CVE-2013-2249date:2013-07-23T00:00:00
db:BIDid:61379date:2013-07-22T00:00:00
db:JVNDBid:JVNDB-2013-003491date:2013-07-24T00:00:00
db:PACKETSTORMid:122708date:2013-08-07T01:22:29
db:CNNVDid:CNNVD-201307-488date:2013-07-31T00:00:00
db:NVDid:CVE-2013-2249date:2013-07-23T17:20:43.357