ID

VAR-200704-0223


CVE

CVE-2007-0744


TITLE

Kerberos administration daemon may free uninitialized pointers

Trust: 0.8

sources: CERT/CC: VU#831452

DESCRIPTION

SMB in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environment when executing commands, which allows local users to gain privileges by setting unspecified environment variables. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. According to Apple information, it may be possible to execute arbitrary code with system privileges. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including AFP Client, AirPortDriver module, CoreServices, Libinfo, Login Window, Natd, SMB, System Configuration, URLMount, VideoConference framework, WebDAV, and WebFoundation. Both local and remote vulnerabilities are present. Apple Mac OS X 10.4.9 and prior versions are vulnerable to these issues. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora Core 6 update for krb5 SECUNIA ADVISORY ID: SA23706 VERIFY ADVISORY: http://secunia.com/advisories/23706/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. For more information: SA23690 SA23696 SOLUTION: Apply updated packages. Fedora Core 6: 43b1b9c946f30629489b903961472d9b0cdf1cd8 SRPMS/krb5-1.5-13.src.rpm 43b1b9c946f30629489b903961472d9b0cdf1cd8 noarch/krb5-1.5-13.src.rpm 42b9b525ea97d128ed22c6feb7b48cc377ca46ad ppc/debug/krb5-debuginfo-1.5-13.ppc.rpm 51c9dfac74d9026509906e953cf92ac50e1a13c4 ppc/krb5-workstation-1.5-13.ppc.rpm 39a5ed204a75766df9daf51a66971f51700d563c ppc/krb5-server-1.5-13.ppc.rpm bce7df56293ae51d79ce1e054b3056d24a1ae8d5 ppc/krb5-devel-1.5-13.ppc.rpm 9097a6f8fdda32e8b976b0beb2b03ba66172327e ppc/krb5-libs-1.5-13.ppc.rpm 51c1f15fca97f267cabd1d1a9851a349fc5a3648 x86_64/krb5-workstation-1.5-13.x86_64.rpm 7cc0d54545539827434c7975697c9c13ae9e4797 x86_64/debug/krb5-debuginfo-1.5-13.x86_64.rpm 71fcdc5dadb273576ad9e530fbb15764650cb84b x86_64/krb5-devel-1.5-13.x86_64.rpm bbe8f1b3e7c6077526f760b361ad6ca5d4039276 x86_64/krb5-libs-1.5-13.x86_64.rpm e38c1dccd2310d3bab9d204226988aee627cfe0d x86_64/krb5-server-1.5-13.x86_64.rpm 02ddf8b25bea088b4de3cc8c27fcf3eb2967efa6 i386/debug/krb5-debuginfo-1.5-13.i386.rpm d6470636e983d8559d4378f819fba80b467af0a5 i386/krb5-libs-1.5-13.i386.rpm 278c19ec68ed47d35c5c2370df5c48807dba1224 i386/krb5-workstation-1.5-13.i386.rpm aa72a083b60ddfb3dbc0761f13ea7147e09995f1 i386/krb5-server-1.5-13.i386.rpm 9cfd3d1d48deb0e7f83a0a13a5ddf2383386b400 i386/krb5-devel-1.5-13.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2375 OTHER REFERENCES: SA23690: http://secunia.com/advisories/23690/ SA23696: http://secunia.com/advisories/23696/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2007-0744 // CERT/CC: VU#831452 // JVNDB: JVNDB-2007-000315 // BID: 23569 // VULHUB: VHN-24106 // PACKETSTORM: 53502

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.7

Trust: 1.0

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mit kerberos teammodel: - scope: - version: -

Trust: 0.8

vendor:openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:rpathmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os preview.appscope:eqversion:x3.0.8

Trust: 0.3

sources: CERT/CC: VU#831452 // BID: 23569 // JVNDB: JVNDB-2007-000315 // CNNVD: CNNVD-200704-432 // NVD: CVE-2007-0744

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2007-0744
value: HIGH

Trust: 1.8

CARNEGIE MELLON: VU#831452
value: 20.93

Trust: 0.8

CNNVD: CNNVD-200704-432
value: HIGH

Trust: 0.6

VULHUB: VHN-24106
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: TRUE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2007-0744
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-24106
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24106 // JVNDB: JVNDB-2007-000315 // CNNVD: CNNVD-200704-432 // NVD: CVE-2007-0744

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0744

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200704-432

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200704-432

CONFIGURATIONS

sources: NVD: CVE-2007-0744

PATCH

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/support/downloads/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/support/downloads/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/support/downloads/securityupdate2007004v111039client.html

Trust: 0.8

title:Security Update 2007-004 (10.3.9 Server)url:http://www.apple.com/support/downloads/securityupdate20070041039server.html

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-en

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-ja

Trust: 0.8

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v111039client.html

Trust: 0.8

title:Security Update 2007-004 (10.3.9 Server)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20070041039server.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000315

EXTERNAL IDS

db:BIDid:23569

Trust: 2.8

db:NVDid:CVE-2007-0744

Trust: 2.8

db:USCERTid:TA07-109A

Trust: 2.5

db:SECUNIAid:24966

Trust: 2.5

db:OSVDBid:34868

Trust: 1.7

db:VUPENid:ADV-2007-1470

Trust: 1.7

db:SECUNIAid:23706

Trust: 0.9

db:BIDid:21975

Trust: 0.8

db:SECUNIAid:23701

Trust: 0.8

db:SECUNIAid:23903

Trust: 0.8

db:SECUNIAid:23667

Trust: 0.8

db:SECUNIAid:23690

Trust: 0.8

db:SECTRACKid:1017494

Trust: 0.8

db:CERT/CCid:VU#831452

Trust: 0.8

db:USCERTid:SA07-109A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000315

Trust: 0.8

db:CNNVDid:CNNVD-200704-432

Trust: 0.7

db:CERT/CCid:TA07-109A

Trust: 0.6

db:APPLEid:APPLE-SA-2007-04-19

Trust: 0.6

db:VULHUBid:VHN-24106

Trust: 0.1

db:PACKETSTORMid:53502

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24106 // BID: 23569 // JVNDB: JVNDB-2007-000315 // PACKETSTORM: 53502 // CNNVD: CNNVD-200704-432 // NVD: CVE-2007-0744

REFERENCES

url:http://www.securityfocus.com/bid/23569

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-109a.html

Trust: 2.5

url:http://secunia.com/advisories/24966

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=305391

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2007/apr/msg00001.html

Trust: 1.7

url:http://www.osvdb.org/34868

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/1470

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/1470

Trust: 1.1

url:http://secunia.com/advisories/23706/

Trust: 0.9

url:http://secunia.com/advisories/23690/

Trust: 0.9

url:http://web.mit.edu/kerberos/www/advisories/mitkrb5-sa-2006-003-mechglue.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt.asc

Trust: 0.8

url:http://securitytracker.com/alerts/2007/jan/1017494.html

Trust: 0.8

url:http://www.securityfocus.com/bid/21975

Trust: 0.8

url:http://secunia.com/advisories/23903/

Trust: 0.8

url:http://secunia.com/advisories/23701/

Trust: 0.8

url:http://secunia.com/advisories/23667/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0744

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-109a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-109a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0744

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-109a.html

Trust: 0.8

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://landonf.bikemonkey.org/2007/04/19#moab_fixes_net_a_bug.20070419203514.5302.timor

Trust: 0.3

url:http://labs.musecurity.com/advisories/mu-200704-01.txt

Trust: 0.3

url:http://secunia.com/advisories/23696/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/12487/

Trust: 0.1

url:http://fedoranews.org/cms/node/2375

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24106 // BID: 23569 // JVNDB: JVNDB-2007-000315 // PACKETSTORM: 53502 // CNNVD: CNNVD-200704-432 // NVD: CVE-2007-0744

CREDITS

Landon FullerMu SecurityDaniel BallGeoff FranksJamie Cox

Trust: 0.6

sources: CNNVD: CNNVD-200704-432

SOURCES

db:CERT/CCid:VU#831452
db:VULHUBid:VHN-24106
db:BIDid:23569
db:JVNDBid:JVNDB-2007-000315
db:PACKETSTORMid:53502
db:CNNVDid:CNNVD-200704-432
db:NVDid:CVE-2007-0744

LAST UPDATE DATE

2024-05-03T20:21:30.498000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#831452date:2007-05-10T00:00:00
db:VULHUBid:VHN-24106date:2011-03-08T00:00:00
db:BIDid:23569date:2007-05-02T20:29:00
db:JVNDBid:JVNDB-2007-000315date:2007-05-18T00:00:00
db:CNNVDid:CNNVD-200704-432date:2007-04-25T00:00:00
db:NVDid:CVE-2007-0744date:2011-03-08T02:50:39.187

SOURCES RELEASE DATE

db:CERT/CCid:VU#831452date:2007-01-09T00:00:00
db:VULHUBid:VHN-24106date:2007-04-24T00:00:00
db:BIDid:23569date:2007-04-19T00:00:00
db:JVNDBid:JVNDB-2007-000315date:2007-05-18T00:00:00
db:PACKETSTORMid:53502date:2007-01-10T18:19:08
db:CNNVDid:CNNVD-200704-432date:2007-04-24T00:00:00
db:NVDid:CVE-2007-0744date:2007-04-24T17:19:00