ID

VAR-201411-0450


CVE

CVE-2014-3660


TITLE

libxml2 of parser.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-005228

DESCRIPTION

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack. This vulnerability Billion Laughs Vulnerability that has been mutated from the attack. Supplementary information : CWE Vulnerability type by CWE-611: Improper Restriction of XML External Entity Reference ('XXE') (XML Inappropriate restrictions on external entity references ) Has been identified. Libxml2 is prone to a denial-of-service vulnerability. Successful exploit will allow attackers to consume large amounts of memory and cause a crash through a specially crafted XML containing malicious attributes. It supports multiple encoding formats, XPath analysis, Well-formed and valid verification, etc. Background ========== libxml2 is the XML C parser and toolkit developed for the Gnome project. Workaround ========== There is no known workaround at this time. Resolution ========== All libxml2 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.9.2" Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages. References ========== [ 1 ] CVE-2014-3660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 OS X Yosemite v10.10.5 and Security Update 2015-006 is now available and addresses the following: apache Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in Apache 2.4.16, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.16. These were addressed by updating Apache to version 2.4.16. CVE-ID CVE-2014-3581 CVE-2014-3583 CVE-2014-8109 CVE-2015-0228 CVE-2015-0253 CVE-2015-3183 CVE-2015-3185 apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in PHP 5.5.20, the most serious of which may lead to arbitrary code execution. Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.20. These were addressed by updating Apache to version 5.5.27. CVE-ID CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 Apple ID OD Plug-in Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able change the password of a local user Description: In some circumstances, a state management issue existed in password authentication. The issue was addressed through improved state management. CVE-ID CVE-2015-3799 : an anonymous researcher working with HP's Zero Day Initiative AppleGraphicsControl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in AppleGraphicsControl which could have led to the disclosure of kernel memory layout. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5768 : JieTao Yang of KeenTeam Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOBluetoothHCIController. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3779 : Teddy Reed of Facebook Security Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: A memory management issue could have led to the disclosure of kernel memory layout. This issue was addressed with improved memory management. CVE-ID CVE-2015-3780 : Roberto Paleari and Aristide Fattori of Emaze Networks Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious app may be able to access notifications from other iCloud devices Description: An issue existed where a malicious app could access a Bluetooth-paired Mac or iOS device's Notification Center notifications via the Apple Notification Center Service. The issue affected devices using Handoff and logged into the same iCloud account. This issue was resolved by revoking access to the Apple Notification Center Service. CVE-ID CVE-2015-3786 : Xiaolong Bai (Tsinghua University), System Security Lab (Indiana University), Tongxin Li (Peking University), XiaoFeng Wang (Indiana University) Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: An attacker with privileged network position may be able to perform denial of service attack using malformed Bluetooth packets Description: An input validation issue existed in parsing of Bluetooth ACL packets. This issue was addressed through improved input validation. CVE-ID CVE-2015-3787 : Trend Micro Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: Multiple buffer overflow issues existed in blued's handling of XPC messages. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-3777 : mitp0sh of [PDX] bootp Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious Wi-Fi network may be able to determine networks a device has previously accessed Description: Upon connecting to a Wi-Fi network, iOS may have broadcast MAC addresses of previously accessed networks via the DNAv4 protocol. This issue was addressed through disabling DNAv4 on unencrypted Wi-Fi networks. CVE-ID CVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute, University of Oxford (on the EPSRC Being There project) CloudKit Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to access the iCloud user record of a previously signed in user Description: A state inconsistency existed in CloudKit when signing out users. This issue was addressed through improved state handling. CVE-ID CVE-2015-3782 : Deepkanwal Plaha of University of Toronto CoreMedia Playback Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in CoreMedia Playback. These were addressed through improved memory handling. CVE-ID CVE-2015-5777 : Apple CVE-2015-5778 : Apple CoreText Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team CoreText Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team curl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities in cURL and libcurl prior to 7.38.0, one of which may allow remote attackers to bypass the Same Origin Policy. Description: Multiple vulnerabilities existed in cURL and libcurl prior to 7.38.0. These issues were addressed by updating cURL to version 7.43.0. CVE-ID CVE-2014-3613 CVE-2014-3620 CVE-2014-3707 CVE-2014-8150 CVE-2014-8151 CVE-2015-3143 CVE-2015-3144 CVE-2015-3145 CVE-2015-3148 CVE-2015-3153 Data Detectors Engine Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a sequence of unicode characters can lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in processing of Unicode characters. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5750 : M1x7e1 of Safeye Team (www.safeye.org) Date & Time pref pane Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Applications that rely on system time may have unexpected behavior Description: An authorization issue existed when modifying the system date and time preferences. This issue was addressed with additional authorization checks. CVE-ID CVE-2015-3757 : Mark S C Smith Dictionary Application Available for: OS X Yosemite v10.10 to v10.10.4 Impact: An attacker with a privileged network position may be able to intercept users' Dictionary app queries Description: An issue existed in the Dictionary app, which did not properly secure user communications. This issue was addressed by moving Dictionary queries to HTTPS. CVE-ID CVE-2015-3774 : Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team DiskImages Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team dyld Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed in dyld. This was addressed through improved environment sanitization. CVE-ID CVE-2015-3760 : beist of grayhash, Stefan Esser FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-3804 : Apple CVE-2015-5775 : Apple FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team groff Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple issues in pdfroff Description: Multiple issues existed in pdfroff, the most serious of which may allow arbitrary filesystem modification. These issues were addressed by removing pdfroff. CVE-ID CVE-2009-5044 CVE-2009-5078 ImageIO Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of TIFF images. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5758 : Apple ImageIO Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Visiting a maliciously crafted website may result in the disclosure of process memory Description: An uninitialized memory access issue existed in ImageIO's handling of PNG and TIFF images. Visiting a malicious website may result in sending data from process memory to the website. This issue is addressed through improved memory initialization and additional validation of PNG and TIFF images. CVE-ID CVE-2015-5781 : Michal Zalewski CVE-2015-5782 : Michal Zalewski Install Framework Legacy Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An issue existed in how Install.framework's 'runner' binary dropped privileges. This issue was addressed through improved privilege management. CVE-ID CVE-2015-5784 : Ian Beer of Google Project Zero Install Framework Legacy Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A race condition existed in Install.framework's 'runner' binary that resulted in privileges being incorrectly dropped. This issue was addressed through improved object locking. CVE-ID CVE-2015-5754 : Ian Beer of Google Project Zero IOFireWireFamily Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: Memory corruption issues existed in IOFireWireFamily. These issues were addressed through additional type input validation. CVE-ID CVE-2015-3769 : Ilja van Sprundel CVE-2015-3771 : Ilja van Sprundel CVE-2015-3772 : Ilja van Sprundel IOGraphics Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOGraphics. This issue was addressed through additional type input validation. CVE-ID CVE-2015-3770 : Ilja van Sprundel CVE-2015-5783 : Ilja van Sprundel IOHIDFamily Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5774 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in the mach_port_space_info interface, which could have led to the disclosure of kernel memory layout. This was addressed by disabling the mach_port_space_info interface. CVE-ID CVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team, @PanguTeam Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2015-3768 : Ilja van Sprundel Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to cause a system denial of service Description: A resource exhaustion issue existed in the fasttrap driver. This was addressed through improved memory handling. CVE-ID CVE-2015-5747 : Maxime VILLARD of m00nbsd Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to cause a system denial of service Description: A validation issue existed in the mounting of HFS volumes. This was addressed by adding additional checks. CVE-ID CVE-2015-5748 : Maxime VILLARD of m00nbsd Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute unsigned code Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation. CVE-ID CVE-2015-3806 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A specially crafted executable file could allow unsigned, malicious code to execute Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files. CVE-ID CVE-2015-3803 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute unsigned code Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks. CVE-ID CVE-2015-3802 : TaiG Jailbreak Team CVE-2015-3805 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted plist may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption existed in processing of malformed plists. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein (@jollyjinx) of Jinx Germany Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed. This was addressed through improved environment sanitization. CVE-ID CVE-2015-3761 : Apple Libc Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted regular expression may lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in the TRE library. These were addressed through improved memory handling. CVE-ID CVE-2015-3796 : Ian Beer of Google Project Zero CVE-2015-3797 : Ian Beer of Google Project Zero CVE-2015-3798 : Ian Beer of Google Project Zero Libinfo Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in handling AF_INET6 sockets. These were addressed by improved memory handling. CVE-ID CVE-2015-5776 : Apple libpthread Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling syscalls. This issue was addressed through improved lock state checking. CVE-ID CVE-2015-5757 : Lufeng Li of Qihoo 360 libxml2 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2, the most serious of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2. These were addressed by updating libxml2 to version 2.9.2. CVE-ID CVE-2012-6685 : Felix Groebert of Google CVE-2014-0191 : Felix Groebert of Google libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory access issue existed in libxml2. This was addressed by improved memory handling CVE-ID CVE-2014-3660 : Felix Groebert of Google libxml2 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory corruption issue existed in parsing of XML files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3807 : Apple libxpc Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling of malformed XPC messages. This issue was improved through improved bounds checking. CVE-ID CVE-2015-3795 : Mathew Rowley mail_cmds Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary shell commands Description: A validation issue existed in the mailx parsing of email addresses. This was addressed by improved sanitization. CVE-ID CVE-2014-7844 Notification Center OSX Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to access all notifications previously displayed to users Description: An issue existed in Notification Center, which did not properly delete user notifications. This issue was addressed by correctly deleting notifications dismissed by users. CVE-ID CVE-2015-3764 : Jonathan Zdziarski ntfs Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in NTFS. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5763 : Roberto Paleari and Aristide Fattori of Emaze Networks OpenSSH Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Remote attackers may be able to circumvent a time delay for failed login attempts and conduct brute-force attacks Description: An issue existed when processing keyboard-interactive devices. This issue was addressed through improved authentication request validation. CVE-ID CVE-2015-5600 OpenSSL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg. These were addressed by updating OpenSSL to version 0.9.8zg. CVE-ID CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 perl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted regular expression may lead to disclosure of unexpected application termination or arbitrary code execution Description: An integer underflow issue existed in the way Perl parsed regular expressions. This issue was addressed through improved memory handling. CVE-ID CVE-2013-7422 PostgreSQL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: An attacker may be able to cause unexpected application termination or gain access to data without proper authentication Description: Multiple issues existed in PostgreSQL 9.2.4. These issues were addressed by updating PostgreSQL to 9.2.13. CVE-ID CVE-2014-0067 CVE-2014-8161 CVE-2015-0241 CVE-2015-0242 CVE-2015-0243 CVE-2015-0244 python Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in Python 2.7.6, the most serious of which may lead to arbitrary code execution Description: Multiple vulnerabilities existed in Python versions prior to 2.7.6. These were addressed by updating Python to version 2.7.10. CVE-ID CVE-2013-7040 CVE-2013-7338 CVE-2014-1912 CVE-2014-7185 CVE-2014-9365 QL Office Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted Office document may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in parsing of Office documents. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5773 : Apple QL Office Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML file may lead to disclosure of user information Description: An external entity reference issue existed in XML file parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A. Quartz Composer Framework Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in parsing of QuickTime files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5771 : Apple Quick Look Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Searching for a previously viewed website may launch the web browser and render that website Description: An issue existed where QuickLook had the capability to execute JavaScript. The issue was addressed by disallowing execution of JavaScript. CVE-ID CVE-2015-3781 : Andrew Pouliot of Facebook, Anto Loyola of Qubole QuickTime 7 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3772 CVE-2015-3779 CVE-2015-5753 : Apple CVE-2015-5779 : Apple QuickTime 7 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3765 : Joe Burnett of Audio Poison CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-5751 : WalkerFuz SceneKit Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Viewing a maliciously crafted Collada file may lead to arbitrary code execution Description: A heap buffer overflow existed in SceneKit's handling of Collada files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5772 : Apple SceneKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in SceneKit. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3783 : Haris Andrianakis of Google Security Team Security Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A standard user may be able to gain access to admin privileges without proper authentication Description: An issue existed in handling of user authentication. This issue was addressed through improved authentication checks. CVE-ID CVE-2015-3775 : [Eldon Ahrold] SMBClient Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the SMB client. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3773 : Ilja van Sprundel Speech UI Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted unicode string with speech alerts enabled may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in handling of Unicode strings. This issue was addressed by improved memory handling. CVE-ID CVE-2015-3794 : Adam Greenbaum of Refinitive sudo Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9, the most serious of which may allow an attacker access to arbitrary files Description: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9. These were addressed by updating sudo to version 1.7.10p9. CVE-ID CVE-2013-1775 CVE-2013-1776 CVE-2013-2776 CVE-2013-2777 CVE-2014-0106 CVE-2014-9680 tcpdump Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in tcpdump 4.7.3, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in tcpdump versions prior to 4.7.3. These were addressed by updating tcpdump to version 4.7.3. CVE-ID CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 Text Formats Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted text file may lead to disclosure of user information Description: An XML external entity reference issue existed with TextEdit parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-3762 : Xiaoyong Wu of the Evernote Security Team udf Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3767 : beist of grayhash OS X Yosemite v10.10.5 includes the security content of Safari 8.0.8: https://support.apple.com/en-us/HT205033 OS X Yosemite 10.10.5 and Security Update 2015-006 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJVzM3+AAoJEBcWfLTuOo7tx/YP/RTsUUx0UTk7rXj6AEcHmiR4 Y2xTUOXqRmxhieSbsGK9laKL5++lIzkGh5RC7oYag0+OgWtZz+EU/EtdoEJmGNJ6 +PgoEnizYdKhO1kos1KCHOwG6UFCqoeEm6Icm33nVUqWp7uAmhVRMRxtMJEScLSR 2LpsK0grIhFXtJGqu053TSKSCa1UTab8XWteZTT84uFGMSKbAFONj5CPIrR6+uev QpVTwrnskPDBOXJwGhjypvIBTbt2aa1wjCukOAWFHwf7Pma/QUdhKRkUK4vAb9/k fu2t2fBOvSMguJHRO+340NsQR9LvmdruBeAyNUH64srF1jtbAg0QnvZsPyO5aIyR A8WrzHl3oIc0II0y7VpI+3o0J3Nn03EcBPtIKeoeyznnjNziDm72HPI2d2+5ZSRz xjAd4Nmw+dgGq+UMkusIXgtRK4HcEpwzfImf3zqnKHakSncnFPhGKyNEgn8bK9a7 AeAvSqMXXsJg8weHUF2NLnAn/42k2wIE8d5BOLaIy13xz6MJn7VUI21pK0zCaGBF sfkRFZP0eEVh8ZzU/nWp9E5KDpbsd72biJwvjWH4OrmkfzUWxStQiVwPTxtZD9LW c5ZWe+vqZJV9eYRH2hAOMPaYkOQ5Z4DySNVVOFAG0eq9til8+V0k3L7ipIVd2XUB msu6gVP8uZhFYNb8byVJ =+0e/ -----END PGP SIGNATURE----- . Summary VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. Relevant Releases VMware Workstation 10.x prior to version 10.0.5 VMware Player 6.x prior to version 6.0.5 VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5 vCenter Server 5.5 prior to Update 2d ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG 3. Problem Description a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability VMware ESXi, Workstation, Player and Fusion contain an arbitrary file write issue. The vulnerability does not allow for privilege escalation from the guest Operating System to the host or vice-versa. This means that host memory can not be manipulated from the Guest Operating System. Mitigation For ESXi to be affected, permissions must have been added to ESXi (or a vCenter Server managing it) for a virtual machine administrator role or greater. VMware would like to thank Shanon Olsson for reporting this issue to us through JPCERT. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-8370 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any not affected Fusion 6.x any 6.0.5 ESXi 5.5 ESXi ESXi550-201403102-SG ESXi 5.1 ESXi ESXi510-201404101-SG ESXi 5.0 ESXi ESXi500-201405101-SG b. VMware Workstation, Player, and Fusion Denial of Service vulnerability VMware Workstation, Player, and Fusion contain an input validation issue in the Host Guest File System (HGFS). This issue may allow for a Denial of Service of the Guest Operating system. VMware would like to thank Peter Kamensky from Digital Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-1043 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any 7.0.1 Fusion 6.x any 6.0.5 c. VMware ESXi, Workstation, and Player Denial of Service vulnerability VMware ESXi, Workstation, and Player contain an input validation issue in VMware Authorization process (vmware-authd). This issue may allow for a Denial of Service of the host. On VMware ESXi and on Workstation running on Linux the Denial of Service would be partial. VMware would like to thank Dmitry Yudin @ret5et for reporting this issue to us through HP's Zero Day Initiative. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-1044 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.5 Fusion 7.x any not affected Fusion 6.x any not affected ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi ESXi510-201410101-SG ESXi 5.0 ESXi not affected d. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2014-3513, CVE-2014-3567, CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server 5.5 any Update 2d* vCenter Server 5.1 any patch pending vCenter Server 5.0 any patch pending ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi patch pending ESXi 5.0 ESXi patch pending * The VMware vCenter 5.5 SSO component will be updated in a later release e. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-3660 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= ESXi 5.5 ESXi ESXi550-201501101-SG ESXi 5.1 ESXi patch pending ESXi 5.0 ESXi patch pending 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation 10.x -------------------------------- https://www.vmware.com/go/downloadworkstation VMware Player 6.x -------------------------------- https://www.vmware.com/go/downloadplayer VMware Fusion 7.x and 6.x -------------------------------- https://www.vmware.com/go/downloadplayer vCenter Server ---------------------------- Downloads and Documentation: https://www.vmware.com/go/download-vsphere ESXi 5.5 Update 2d ---------------------------- File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG ESXi 5.5 ---------------------------- File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG ESXi 5.1 ---------------------------- File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG ESXi 5.0 ---------------------------- File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG 5. Change log 2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2015 VMware Inc. All rights reserved. CVE-ID CVE-2015-5746 : evad3rs, TaiG Jailbreak Team Air Traffic Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: AirTraffic may have allowed access to protected parts of the filesystem Description: A path traversal issue existed in asset handling. CVE-ID CVE-2015-5773 : Apple Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to user interface spoofing Description: A malicious website could open another site and prompt for user input without a way for the user to tell where the prompt originated. CVE-ID CVE-2015-3729 : Code Audit Labs of VulnHunt.com Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may trigger an infinite number of alert messages Description: An issue existed where a malicious or hacked website could show infinite alert messages and make users believe their browser was locked. CVE-ID CVE-2015-3730 : Apple CVE-2015-3731 : Apple CVE-2015-3732 : Apple CVE-2015-3733 : Apple CVE-2015-3734 : Apple CVE-2015-3735 : Apple CVE-2015-3736 : Apple CVE-2015-3737 : Apple CVE-2015-3738 : Apple CVE-2015-3739 : Apple CVE-2015-3740 : Apple CVE-2015-3741 : Apple CVE-2015-3742 : Apple CVE-2015-3743 : Apple CVE-2015-3744 : Apple CVE-2015-3745 : Apple CVE-2015-3746 : Apple CVE-2015-3747 : Apple CVE-2015-3748 : Apple CVE-2015-3749 : Apple Web Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to user interface spoofing Description: Navigating to a malformed URL may have allowed a malicious website to display an arbitrary URL. CVE-ID CVE-2015-3755 : xisigr of Tencent's Xuanwu Lab WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may exfiltrate image data cross-origin Description: Images fetched through URLs that redirected to a data:image resource could have been exfiltrated cross-origin. CVE-ID CVE-2015-3753 : Antonio Sanso and Damien Antipa of Adobe WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website can trigger plaintext requests to an origin under HTTP Strict Transport Security Description: An issue existed where Content Security Policy report requests would not honor HTTP Strict Transport Security (HSTS). CVE-ID CVE-2015-3750 : Muneaki Nishimura (nishimunea) WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website can make a tap event produce a synthetic click on another page Description: An issue existed in how synthetic clicks are generated from tap events that could cause clicks to target other pages. CVE-ID CVE-2015-5759 : Phillip Moon and Matt Weston of Sandfield WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Content Security Policy report requests may leak cookies Description: Two issues existed in how cookies were added to Content Security Policy report requests. Cookies were sent in cross-origin report requests in violation of the standard. Cookies set during regular browsing were sent in private browsing. CVE-ID CVE-2015-3752 : Muneaki Nishimura (nishimunea) WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Image loading may violate a website's Content Security Policy directive Description: An issue existed where websites with video controls would load images nested in object elements in violation of the website's Content Security Policy directive. CVE-ID CVE-2015-3751 : Muneaki Nishimura (nishimunea) Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2014:1655-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1655.html Issue date: 2014-10-16 CVE Names: CVE-2014-3660 ===================================================================== 1. Summary: Updated libxml2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. (CVE-2014-3660) All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libxml2-2.7.6-17.el6_6.1.src.rpm i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libxml2-2.7.6-17.el6_6.1.src.rpm x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libxml2-2.7.6-17.el6_6.1.src.rpm i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm ppc64: libxml2-2.7.6-17.el6_6.1.ppc.rpm libxml2-2.7.6-17.el6_6.1.ppc64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.ppc.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm libxml2-devel-2.7.6-17.el6_6.1.ppc.rpm libxml2-devel-2.7.6-17.el6_6.1.ppc64.rpm libxml2-python-2.7.6-17.el6_6.1.ppc64.rpm s390x: libxml2-2.7.6-17.el6_6.1.s390.rpm libxml2-2.7.6-17.el6_6.1.s390x.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.s390.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm libxml2-devel-2.7.6-17.el6_6.1.s390.rpm libxml2-devel-2.7.6-17.el6_6.1.s390x.rpm libxml2-python-2.7.6-17.el6_6.1.s390x.rpm x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm ppc64: libxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm libxml2-static-2.7.6-17.el6_6.1.ppc64.rpm s390x: libxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm libxml2-static-2.7.6-17.el6_6.1.s390x.rpm x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libxml2-2.7.6-17.el6_6.1.src.rpm i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: libxml2-2.9.1-5.el7_0.1.src.rpm x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libxml2-2.9.1-5.el7_0.1.src.rpm x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libxml2-2.9.1-5.el7_0.1.src.rpm ppc64: libxml2-2.9.1-5.el7_0.1.ppc.rpm libxml2-2.9.1-5.el7_0.1.ppc64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm libxml2-devel-2.9.1-5.el7_0.1.ppc.rpm libxml2-devel-2.9.1-5.el7_0.1.ppc64.rpm libxml2-python-2.9.1-5.el7_0.1.ppc64.rpm s390x: libxml2-2.9.1-5.el7_0.1.s390.rpm libxml2-2.9.1-5.el7_0.1.s390x.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm libxml2-devel-2.9.1-5.el7_0.1.s390.rpm libxml2-devel-2.9.1-5.el7_0.1.s390x.rpm libxml2-python-2.9.1-5.el7_0.1.s390x.rpm x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm libxml2-static-2.9.1-5.el7_0.1.ppc.rpm libxml2-static-2.9.1-5.el7_0.1.ppc64.rpm s390x: libxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm libxml2-static-2.9.1-5.el7_0.1.s390.rpm libxml2-static-2.9.1-5.el7_0.1.s390x.rpm x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libxml2-2.9.1-5.el7_0.1.src.rpm x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-3660.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. This caused libxml2 to still fetch external entities regardless of whether entity substitution or validation is enabled. In addition, this update addresses a regression introduced in DSA 3057 by the patch fixing CVE-2014-3660. This caused libxml2 to not parse an entity when it's used first in another entity referenced from an attribute value. For the stable distribution (wheezy), these problems have been fixed in version 2.8.0+dfsg1-7+wheezy3. For the upcoming stable distribution (jessie), these problems have been fixed in version 2.9.1+dfsg1-4. For the unstable distribution (sid), these problems have been fixed in version 2.9.1+dfsg1-4

Trust: 2.7

sources: NVD: CVE-2014-3660 // JVNDB: JVNDB-2014-005228 // BID: 70644 // VULHUB: VHN-71600 // VULMON: CVE-2014-3660 // PACKETSTORM: 129482 // PACKETSTORM: 133079 // PACKETSTORM: 128847 // PACKETSTORM: 130144 // PACKETSTORM: 133080 // PACKETSTORM: 128709 // PACKETSTORM: 130293

AFFECTED PRODUCTS

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.13

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.0

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.8

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.4

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.0.0

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.7

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.11

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.12

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.11

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.1

Trust: 1.9

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.10

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.6

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.6

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.6

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.32

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.1

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.14

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.9

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.1.0

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.25

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.30

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.12

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.8

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.0

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.18

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.2

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.28

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.14

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.24

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.4

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.6

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.16

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.29

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.2

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.7

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.9.0

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.3

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.10

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.14

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.21

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.7

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.25

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.3

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.28

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.5

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.8

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.26

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.10

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.4

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.26

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.18

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.6

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.17

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.22

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.0

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.10

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.13

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.8

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.4

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.9

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.20

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.21

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.5

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.2

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.3

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.30

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.23

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.1

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.29

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.22

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.11

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.8

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.31

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.27

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.1

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.27

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.4

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.3

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.3

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.19

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.5

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.24

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.9

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.0

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.23

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.8

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.5

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.11

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.16

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.20

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.1

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.2

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.4

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.15

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.13

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.12

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.5

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.2

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.17

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.7

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.7

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.7

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.11

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.1.1

Trust: 1.3

vendor:xmlsoftmodel:libxml2scope:lteversion:2.9.1

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.8.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.9

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:ltversion:2.9.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.4.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.4.1 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.4.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.8

vendor:ibmmodel:system networking rackswitch g8316scope:eqversion:7.9.11.0

Trust: 0.3

vendor:avayamodel:aura collaboration environmentscope:eqversion:3.0

Trust: 0.3

vendor:ibmmodel:flex system en2092 1gb ethernet scalable switchscope:eqversion:7.8.60

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8332scope:eqversion:7.7.13.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.1

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management module 25r5778scope: - version: -

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:bladecenter -sscope:eqversion:1948

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264-tscope:eqversion:7.9.13.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124-escope:eqversion:7.9.11.0

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x355042540

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:neversion:8.4.1

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8332scope:eqversion:7.7.18.0

Trust: 0.3

vendor:ibmmodel:system m2 typescope:eqversion:x355041980

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8316scope:eqversion:7.9.100

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2.3

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124-escope:eqversion:7.9.100

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:flex system fabric cn4093 10gb converged scalable switchscope:eqversion:7.8.60

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093r 10gb scalable switchscope:eqversion:7.8.6.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264csscope:eqversion:7.8.60

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.1.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.1

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8332scope:eqversion:7.7.170

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.3

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.1.1

Trust: 0.3

vendor:ibmmodel:bladecenter -tscope:eqversion:8720

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.1.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.0.3

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.9

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x365079450

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:bladecenter -sscope:eqversion:8886

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124scope:eqversion:7.9.11.0

Trust: 0.3

vendor:avayamodel:aura communication manager ssp04scope:eqversion:6.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:ibmmodel:flex system fabric cn4093 10gb converged scalable switchscope:eqversion:7.5.1.0

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura application server sip core pb23scope:eqversion:53002.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7.0.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:6.2.0

Trust: 0.3

vendor:ibmmodel:flex system fabric cn4093 10gb converged scalable switchscope:eqversion:7.8.8.0

Trust: 0.3

vendor:ibmmodel:bladecenter -escope:eqversion:7967

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:virtual fabric 10gb switch module for ibm bladecenterscope:eqversion:7.8.5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093r 10gb scalable switchscope:eqversion:7.8.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:ibmmodel:bladecenter -hscope:eqversion:8852

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.5

Trust: 0.3

vendor:ibmmodel:bladecenter -htscope:eqversion:8750

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124scope:eqversion:7.9.100

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x365042550

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8316scope:eqversion:7.6.1.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.3

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264-tscope:eqversion:7.9.11.0

Trust: 0.3

vendor:vmwaremodel:esxi esxi550-20150110scope:neversion:5.5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.3

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.2

Trust: 0.3

vendor:ibmmodel:flex system en2092 1gb ethernet scalable switchscope:eqversion:7.8.7

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093 10gb scalable switchscope:eqversion:7.8.4.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility services spscope:eqversion:6.16.1.0.9.8

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.3.8

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3690x571480

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.5

Trust: 0.3

vendor:ibmmodel:flex system en2092 1gb ethernet scalable switchscope:eqversion:7.8.10.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x350073800

Trust: 0.3

vendor:ibmmodel:bladecenter -escope:eqversion:1881

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2.4.0.15

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:ibmmodel:flex system fabric si4093 system interconnect modulescope:eqversion:7.8.4.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264-tscope:eqversion:7.9.100

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093 10gb scalable switchscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:system idataplex dx360 m3 typescope:eqversion:x63910

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:cms r17scope: - version: -

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:avayamodel:aura utility services sp7scope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2.4

Trust: 0.3

vendor:avayamodel:aura application server sip core pb28scope:eqversion:53002.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.1.1

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.1.2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.1.21

Trust: 0.3

vendor:ibmmodel:bladecenter -sscope:eqversion:7779

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4.2

Trust: 0.3

vendor:ibmmodel:flex system en2092 1gb ethernet scalable switchscope:eqversion:7.8.4.0

Trust: 0.3

vendor:applemodel:tvscope:neversion:7.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3690x571470

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8332scope:eqversion:7.7.19.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.1.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2.5.0.15

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.6

Trust: 0.3

vendor:ibmmodel:system m2 typescope:eqversion:x365041990

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.3

vendor:ibmmodel:flex system fabric cn4093 10gb converged scalable switchscope:eqversion:7.8.10.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7.0.3

Trust: 0.3

vendor:ibmmodel:flex system en2092 1gb ethernet scalable switchscope:eqversion:7.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.1.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.3

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3950x571430

Trust: 0.3

vendor:ibmmodel:system idataplex dx360 m2 typescope:eqversion:x73210

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:system idataplex dx360 m2 typescope:eqversion:x63800

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.1.21

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.6

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.8.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.1.21

Trust: 0.3

vendor:ibmmodel:integrated management modulescope:eqversion:1.47

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.3

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.6

Trust: 0.3

vendor:ibmmodel:flex system fabric cn4093 10gb converged scalable switchscope:eqversion:7.8.4.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.9.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2.1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264csscope:eqversion:7.8.4.0

Trust: 0.3

vendor:avayamodel:aura application server sip core pb19scope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:7.8.1.0

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1.0

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:5.5

Trust: 0.3

vendor:avayamodel:aura collaboration environmentscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8052scope:eqversion:7.9.11.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264-tscope:eqversion:7.6.1.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264csscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:system m2 typescope:eqversion:x355079460

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.7

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x355079440

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3690x571920

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management module 3.66nscope:neversion: -

Trust: 0.3

vendor:ibmmodel:system m2 typescope:eqversion:x365079470

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.3

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3690x571490

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2.1

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3850x571430

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura application server sip core pb3scope:eqversion:53003.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8052scope:eqversion:7.9.100

Trust: 0.3

vendor:avayamodel:aura application server sip core pb26scope:eqversion:53002.0

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.0.2

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7.0.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:bladecenter t advanced management module 32r0835scope: - version: -

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093r 10gb scalable switchscope:eqversion:7.8.10.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093 10gb scalable switchscope:eqversion:7.8.6.0

Trust: 0.3

vendor:ibmmodel:integrated management modulescope:eqversion:1.00

Trust: 0.3

vendor:avayamodel:aura presence services sp2scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:6.8.2.0

Trust: 0.3

vendor:avayamodel:aura presence services sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.3.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.1.2

Trust: 0.3

vendor:ibmmodel:bladecenter -tscope:eqversion:8730

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.3

vendor:xmlsoftmodel:libxml2 rc1scope:eqversion:2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management module 3.66kscope: - version: -

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8316scope:eqversion:7.9.13.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.5

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.1.21

Trust: 0.3

vendor:ibmmodel:bladecenter -hscope:eqversion:7989

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.3

Trust: 0.3

vendor:ibmmodel:flex system fabric si4093 system interconnect modulescope:eqversion:7.8.8.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.10

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2.2

Trust: 0.3

vendor:ibmmodel:bladecenter -htscope:eqversion:8740

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124-escope:eqversion:7.9.13.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.3

vendor:avayamodel:aura application server sip core pb5scope:eqversion:53003.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:31005.1.1

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093r 10gb scalable switchscope:eqversion:7.8.4.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.15

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:eqversion:2.9.1

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:ibmmodel:virtual fabric 10gb switch module for ibm bladecenterscope:eqversion:5.0.1.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.4

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:system idataplex dx360 m2 typescope:eqversion:x73230

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:7.9.11.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:41005.2

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093 10gb scalable switchscope:eqversion:7.8.9

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x363073770

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:flex system fabric en4093r 10gb scalable switchscope:eqversion:7.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2.1.0.9

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124-escope:eqversion:7.7.3.0

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53003.0

Trust: 0.3

vendor:avayamodel:aura application server sip core pb25scope:eqversion:53002.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7.1

Trust: 0.3

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:aura system manager sp3scope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:7.9.13.0

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3950x57145

Trust: 0.3

vendor:ibmmodel:bladecenter -hscope:eqversion:1886

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8052scope:eqversion:6.8

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:71005.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7.2

Trust: 0.3

vendor:xmlsoftmodel:libxml2scope:neversion:2.9.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura system platform sp1scope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura utility servicesscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:7.9.100

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3850x571910

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264scope:eqversion:7.9.12.0

Trust: 0.3

vendor:ibmmodel:bladecenter -escope:eqversion:8677

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:51005.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:ibmmodel:system m3 typescope:eqversion:x365054540

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:avayamodel:aura utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1.0.9.8

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8264csscope:eqversion:7.8.8.0

Trust: 0.3

vendor:avayamodel:aura application server sip core pb16scope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.3

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:system m2 typescope:eqversion:x350078390

Trust: 0.3

vendor:xmlsoftmodel:libxml2 betascope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3850x571450

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:ibmmodel:flex system fabric si4093 system interconnect modulescope:eqversion:7.8.60

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:ibmmodel:flex system fabric si4093 system interconnect modulescope:eqversion:7.7.5.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:system typescope:eqversion:x3850x571460

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:flex system fabric si4093 system interconnect modulescope:eqversion:7.8.10.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.4

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:ibmmodel:system networking rackswitch g8124scope:eqversion:7.7.3.0

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: BID: 70644 // JVNDB: JVNDB-2014-005228 // CNNVD: CNNVD-201410-1338 // NVD: CVE-2014-3660

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3660
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3660
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201410-1338
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71600
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-3660
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3660
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-71600
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71600 // VULMON: CVE-2014-3660 // JVNDB: JVNDB-2014-005228 // CNNVD: CNNVD-201410-1338 // NVD: CVE-2014-3660

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2014-005228 // NVD: CVE-2014-3660

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 128847 // PACKETSTORM: 128709 // CNNVD: CNNVD-201410-1338

TYPE

Unknown

Trust: 0.3

sources: BID: 70644

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005228

PATCH

title:APPLE-SA-2015-08-13-3 iOS 8.4.1url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205030url:https://support.apple.com/en-us/HT205030

Trust: 0.8

title:HT205031url:https://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205030url:https://support.apple.com/ja-jp/HT205030

Trust: 0.8

title:HT205031url:https://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:openSUSE-SU-2014:1330url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html

Trust: 0.8

title:Oracle Third Party Bulletin - January 2015url:http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

Trust: 0.8

title:Attachment #944444url:https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff

Trust: 0.8

title:Bug 1149084url:https://bugzilla.redhat.com/show_bug.cgi?id=1149084

Trust: 0.8

title:RHSA-2014:1885url:http://rhn.redhat.com/errata/RHSA-2014-1885.html

Trust: 0.8

title:RHSA-2014:1655url:https://rhn.redhat.com/errata/RHSA-2014-1655.html

Trust: 0.8

title:USN-2389-1url:http://www.ubuntu.com/usn/USN-2389-1/

Trust: 0.8

title:Top Pageurl:http://xmlsoft.org/index.html

Trust: 0.8

title:libxml2-2.9.2-win32-x86_64url:http://123.124.177.30/web/xxk/bdxqById.tag?id=55451

Trust: 0.6

title:Ubuntu Security Notice: libxml2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2389-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2014-3660 libxml2 billion laugh varianturl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=5683b390d2b4504ec2ce5aff42cc28e1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-444url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-444

Trust: 0.1

title:Red Hat: CVE-2014-3660url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3660

Trust: 0.1

title:VMware Security Advisories: VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issuesurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=6e6083adbf6a5be47af800d437e987a5

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: CVE-2015-1819: denial of service processing a crafted XML documenturl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d4df89c444b497f8334824cafc13f268

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: out-of-bounds readurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7cf75e4a67dc759cf112b117265731c9

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: parsing an unclosed comment can result in `Conditional jump or move depends on uninitialised value(s)` and unsafe memory accessurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=2e6915a419592c0eb35235af4b02c926

Trust: 0.1

title:Apple: Apple TV 7.2.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=7fd0c8e5493266a37a14d1b8b5c5ece7

Trust: 0.1

title:Apple: iOS 8.4.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=1e360caea44107f4b635ae5265ed4e38

Trust: 0.1

title:Apple: OS X Yosemite v10.10.5 and Security Update 2015-006url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=9834d0d73bf28fb80d3390930bafd906

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eaf98750f1130c39e83765575c69e165

Trust: 0.1

title:nokogiri-strdup-segfault-mweurl:https://github.com/projectivetech/nokogiri-strdup-segfault-mwe

Trust: 0.1

title:nokogiri-strdup-segfault-mweurl:https://github.com/FlavourSys/nokogiri-strdup-segfault-mwe

Trust: 0.1

title:exploitsurl:https://github.com/hackerhouse-opensource/exploits

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2016/02/26/remote_god_mode_code_exec_star_in_apple_tv_3_patch_party_premiere/

Trust: 0.1

sources: VULMON: CVE-2014-3660 // JVNDB: JVNDB-2014-005228 // CNNVD: CNNVD-201410-1338

EXTERNAL IDS

db:NVDid:CVE-2014-3660

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2014/10/17/7

Trust: 2.0

db:BIDid:70644

Trust: 1.5

db:SECUNIAid:61991

Trust: 1.2

db:SECUNIAid:61966

Trust: 1.2

db:SECUNIAid:59903

Trust: 1.2

db:SECUNIAid:61965

Trust: 1.2

db:JUNIPERid:JSA10705

Trust: 1.2

db:JVNDBid:JVNDB-2014-005228

Trust: 0.8

db:CNNVDid:CNNVD-201410-1338

Trust: 0.7

db:AUSCERTid:ESB-2023.3732

Trust: 0.6

db:PACKETSTORMid:129482

Trust: 0.2

db:PACKETSTORMid:128709

Trust: 0.2

db:PACKETSTORMid:128847

Trust: 0.2

db:PACKETSTORMid:128837

Trust: 0.1

db:PACKETSTORMid:129197

Trust: 0.1

db:PACKETSTORMid:128845

Trust: 0.1

db:VULHUBid:VHN-71600

Trust: 0.1

db:VULMONid:CVE-2014-3660

Trust: 0.1

db:PACKETSTORMid:133079

Trust: 0.1

db:PACKETSTORMid:130144

Trust: 0.1

db:PACKETSTORMid:133080

Trust: 0.1

db:PACKETSTORMid:130293

Trust: 0.1

sources: VULHUB: VHN-71600 // VULMON: CVE-2014-3660 // BID: 70644 // JVNDB: JVNDB-2014-005228 // PACKETSTORM: 129482 // PACKETSTORM: 133079 // PACKETSTORM: 128847 // PACKETSTORM: 130144 // PACKETSTORM: 133080 // PACKETSTORM: 128709 // PACKETSTORM: 130293 // CNNVD: CNNVD-201410-1338 // NVD: CVE-2014-3660

REFERENCES

url:http://www.openwall.com/lists/oss-security/2014/10/17/7

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 1.5

url:https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html

Trust: 1.5

url:http://www.securityfocus.com/bid/70644

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2014-1655.html

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00002.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=1149084

Trust: 1.2

url:https://support.apple.com/kb/ht205030

Trust: 1.2

url:https://support.apple.com/kb/ht205031

Trust: 1.2

url:http://www.debian.org/security/2014/dsa-3057

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2014:244

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2014-1885.html

Trust: 1.2

url:http://secunia.com/advisories/59903

Trust: 1.2

url:http://secunia.com/advisories/61965

Trust: 1.2

url:http://secunia.com/advisories/61966

Trust: 1.2

url:http://secunia.com/advisories/61991

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2389-1

Trust: 1.2

url:https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff

Trust: 1.1

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10705

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3660

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-3660

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2023.3732

Trust: 0.6

url:http://www.debian.org/security/

Trust: 0.4

url:http://www.apple.com/ios/

Trust: 0.3

url:https://www.apple.com/osx/

Trust: 0.3

url:https://git.gnome.org/browse/libxml2/commit/?id=be2a7edaf289c5da74a4f9ed3a0b6c733e775230

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://seclists.org/oss-sec/2014/q4/378

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/101007010

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098592

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097607

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21690824

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098306

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2015-0001.html

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/101009000

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097736

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0191

Trust: 0.3

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-6685

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10705

Trust: 0.1

url:https://bugzilla.redhat.com/attachment.cgi?id=944444&amp;action=diff

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/projectivetech/nokogiri-strdup-segfault-mwe

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-3660

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=36123

Trust: 0.1

url:https://usn.ubuntu.com/2389-1/

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-06.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1775

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7185

Trust: 0.1

url:https://support.apple.com/en-us/ht205033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8767

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2777

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3581

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0106

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7338

Trust: 0.1

url:https://www.safeye.org)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3707

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0067

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5078

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8151

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1912

Trust: 0.1

url:https://twitter.com/vmwaresrc

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1044

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566

Trust: 0.1

url:http://kb.vmware.com/kb/2078735

Trust: 0.1

url:http://kb.vmware.com/kb/2070666

Trust: 0.1

url:http://www.vmware.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8370

Trust: 0.1

url:http://kb.vmware.com/kb/2075521

Trust: 0.1

url:http://kb.vmware.com/kb/2065832

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:https://www.vmware.com/go/downloadplayer

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://www.vmware.com/support/policies/lifecycle.html

Trust: 0.1

url:https://www.vmware.com/go/downloadworkstation

Trust: 0.1

url:http://kb.vmware.com/kb/2099265

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:https://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370

Trust: 0.1

url:https://www.vmware.com/go/download-vsphere

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3729

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3732

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3730

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3738

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3746

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3740

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3747

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3745

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3753

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3739

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3660.html

Trust: 0.1

sources: VULHUB: VHN-71600 // VULMON: CVE-2014-3660 // BID: 70644 // JVNDB: JVNDB-2014-005228 // PACKETSTORM: 129482 // PACKETSTORM: 133079 // PACKETSTORM: 128847 // PACKETSTORM: 130144 // PACKETSTORM: 133080 // PACKETSTORM: 128709 // PACKETSTORM: 130293 // CNNVD: CNNVD-201410-1338 // NVD: CVE-2014-3660

CREDITS

Netherlands Cyber Security Center

Trust: 0.9

sources: BID: 70644 // CNNVD: CNNVD-201410-1338

SOURCES

db:VULHUBid:VHN-71600
db:VULMONid:CVE-2014-3660
db:BIDid:70644
db:JVNDBid:JVNDB-2014-005228
db:PACKETSTORMid:129482
db:PACKETSTORMid:133079
db:PACKETSTORMid:128847
db:PACKETSTORMid:130144
db:PACKETSTORMid:133080
db:PACKETSTORMid:128709
db:PACKETSTORMid:130293
db:CNNVDid:CNNVD-201410-1338
db:NVDid:CVE-2014-3660

LAST UPDATE DATE

2025-03-26T19:52:33.891000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71600date:2016-12-08T00:00:00
db:VULMONid:CVE-2014-3660date:2016-12-08T00:00:00
db:BIDid:70644date:2016-07-29T17:00:00
db:JVNDBid:JVNDB-2014-005228date:2015-08-31T00:00:00
db:CNNVDid:CNNVD-201410-1338date:2023-06-30T00:00:00
db:NVDid:CVE-2014-3660date:2024-11-21T02:08:35.850

SOURCES RELEASE DATE

db:VULHUBid:VHN-71600date:2014-11-04T00:00:00
db:VULMONid:CVE-2014-3660date:2014-11-04T00:00:00
db:BIDid:70644date:2014-10-17T00:00:00
db:JVNDBid:JVNDB-2014-005228date:2014-11-06T00:00:00
db:PACKETSTORMid:129482date:2014-12-11T16:10:57
db:PACKETSTORMid:133079date:2015-08-13T22:15:27
db:PACKETSTORMid:128847date:2014-10-27T22:06:20
db:PACKETSTORMid:130144date:2015-01-28T18:22:00
db:PACKETSTORMid:133080date:2015-08-13T22:18:25
db:PACKETSTORMid:128709date:2014-10-17T00:03:41
db:PACKETSTORMid:130293date:2015-02-09T21:08:03
db:CNNVDid:CNNVD-201410-1338date:2014-10-28T00:00:00
db:NVDid:CVE-2014-3660date:2014-11-04T16:55:06.043