ID

VAR-200708-0456


CVE

CVE-2007-3744


TITLE

mDNSResponder of UPnP IGD Implementation heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-002336

DESCRIPTION

Heap-based buffer overflow in the UPnP IGD (Internet Gateway Device Standardized Device Control Protocol) implementation in mDNSResponder on Apple Mac OS X 10.4.10 before 20070731 allows network-adjacent remote attackers to execute arbitrary code via a crafted packet. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including CFNetwork, CoreAudio, iChat, mDNSResponder, PDFKit, Quartz Composer, Samba, and WebCore. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. Apple Mac OS X 10.4.10 and prior versions are vulnerable to these issues. BACKGROUND mDNSResponder is part of the Bonjour suite of applications. Bonjour is used to provide automatic and transparent configuration of network devices. It is similar to UPnP, in that the goal of both is to allow users to simply plug devices into a network without worrying about configuration details. mDNSResponder runs by default on both Server and Workstation. More information can be found on the vendor's website. http://developer.apple.com/opensource/internet/bonjour.html II. The vulnerability exists within the Legacy NAT Traversal code. Unlike the core of the mDNSResponder service, this area of code does not rely on Multicast UDP. It listens on a dynamically allocated Unicast UDP port. The vulnerability occurs when parsing a malformed HTTP request. This results in an exploitable heap overflow. III. No authentication is needed to exploit this vulnerability. Failed attempts will result in the service crashing. Shortly after crashing, it will be restarted. IV. Previous versions may also be affected. V. WORKAROUND iDefense is currently unaware of any workarounds for this issue. VI. More information is available at the following URL. http://docs.info.apple.com/article.html?artnum=306172 VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3744 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 07/26/2007 Initial vendor notification 07/26/2007 Initial vendor response 08/07/2007 Coordinated public disclosure IX. CREDIT This vulnerability was reported to iDefense by Neil Kettle (mu-b) of www.digit-labs.org. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: mDNSResponder: Multiple vulnerabilities Date: January 20, 2012 Bugs: #290822 ID: 201201-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in mDNSResponder, which could lead to execution of arbitrary code with root privileges. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/mDNSResponder < 212.1 >= 212.1 Description =========== Multiple vulnerabilities have been discovered in mDNSResponder. Please review the CVE identifiers referenced below for details. Resolution ========== All mDNSResponder users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mDNSResponder-212.1" NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is already no longer affected by this issue. References ========== [ 1 ] CVE-2007-2386 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386 [ 2 ] CVE-2007-3744 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744 [ 3 ] CVE-2007-3828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828 [ 4 ] CVE-2008-0989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989 [ 5 ] CVE-2008-2326 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326 [ 6 ] CVE-2008-3630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201201-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26235 VERIFY ADVISORY: http://secunia.com/advisories/26235/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. 1) An error within the handling of FTP URIs in CFNetwork can be exploited to run arbitrary FTP commands in context of the user's FTP client, when a user is enticed to click on a specially crafted FTP URI. 2) An input validation error can cause applications using CFNetwork to become vulnerable to HTTP response splitting attacks. 3) A design error exists in the Java interface to CoreAudio, which can be exploited to free arbitrary memory, when a user is enticed to visit a web site containing a specially crafted Java applet. 4) An unspecified error exists in the Java interface to CoreAudio, which can be exploited to read or write out of bounds of the allocated heap by enticing a user to visit a web site containing a specially crafted Java applet. 5) A unspecified error exists in the Java interface to CoreAudio, which can be exploited to instantiate or manipulate objects outside the bounds of the allocated heap, when a user is enticed to visit a web site containing a specially crafted Java applet. 8) Some vulnerabilities in Kerberos can be exploited by malicious users and malicious people to compromise a vulnerable system. 10) An integer underflow exists in PDFKit within the handling of PDF files in Preview and may be exploited to execute arbitrary code when a user opens a specially crafted PDF file. 11) Multiple vulnerabilities exist in PHP, which can be exploited to disclose potentially sensitive information, to cause a DoS (Denial of Service), to bypass certain security restrictions, to conduct cross-site scripting attacks, or to compromise a vulnerable system. For more information: SA24814 SA24356 SA24440 SA24505 SA24542 SA25123 12) An error exists in Quartz Composer due to an uninitialized object pointer when handling Quartz Composer files and may be exploited to execute arbitrary code when a specially crafted Quartz Composer file is viewed. 13) Some vulnerabilities exist in Samba, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA25232 14) An unspecified error in Samba can be exploited to bypass file system quotas. 15) Some vulnerabilities in Squirrelmail can be exploited by malicious people to disclose and manipulate certain sensitive information or to conduct cross-site scripting, cross-site request forgery, and script insertion attacks. For more information: SA16987 SA20406 SA21354 SA23195 SA25200 16) Some vulnerabilities in Apache Tomcat can be exploited by malicious people to conduct cross-site scripting attacks or to bypass certain security restrictions. For more information: SA24732 SA25383 SA25721 17) An error in WebCore can be exploited to load Java applets even when Java is disabled in the preferences. 18) An error in WebCore can be exploited to conduct cross-site scripting attacks. For more information see vulnerability #1 in: SA23893 19) An error in WebCore can be exploited by malicious people to gain knowledge of sensitive information. For more information see vulnerability #2 in: SA23893 20) An error in WebCore when handling properties of certain global objects can be exploited to conduct cross-site scripting attacks when navigating to a new URL with Safari. 21) An error in WebKit within in the handling of International Domain Name (IDN) support and Unicode fonts embedded in Safari can be exploited to spoof a URL. This is similar to: SA14164 22) A boundary error in the Perl Compatible Regular Expressions (PCRE) library in WebKit and used by the JavaScript engine in Safari can be exploited to cause a heap-based buffer overflow when a user visits a malicious web page. 23) Input validation errors exists in bzgrep and zgrep. For more information: SA15047 SOLUTION: Apply Security Update 2007-007. Security Update 2007-007 (10.4.10 Server Universal): http://www.apple.com/support/downloads/securityupdate200700710410serveruniversal.html Security Update 2007-007 (10.4.10 Universal): http://www.apple.com/support/downloads/securityupdate200700710410universal.html Security Update 2007-007 (10.4.10 Server PPC): http://www.apple.com/support/downloads/securityupdate200700710410serverppc.html Security Update 2007-007 (10.4.10 PPC): http://www.apple.com/support/downloads/securityupdate200700710410ppc.html Security Update 2007-007 (10.3.9 Server): http://www.apple.com/support/downloads/securityupdate20070071039server.html Security Update 2007-007 (10.3.9): http://www.apple.com/support/downloads/securityupdate20070071039.html PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Steven Kramer, sprintteam.nl. 14) The vendor credits Mike Matz, Wyomissing Area School District. 17) The vendor credits Scott Wilde. 19) Secunia Research 22) The vendor credits Charlie Miller and Jake Honoroff of Independent Security Evaluators. ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=306172 OTHER REFERENCES: SA13237: http://secunia.com/advisories/13237/ SA15047: http://secunia.com/advisories/15047/ SA16987: http://secunia.com/advisories/16987/ SA20406: http://secunia.com/advisories/20406/ SA21354: http://secunia.com/advisories/21354/ SA22588: http://secunia.com/advisories/22588/ SA23195: http://secunia.com/advisories/23195/ SA23893: http://secunia.com/advisories/23893/ SA24814: http://secunia.com/advisories/24814/ SA24356: http://secunia.com/advisories/24356/ SA24440: http://secunia.com/advisories/24440/ SA24505: http://secunia.com/advisories/24505/ SA24542: http://secunia.com/advisories/24542/ SA24732: http://secunia.com/advisories/24732/ SA25800: http://secunia.com/advisories/25800/ SA25123: http://secunia.com/advisories/25123/ SA25200: http://secunia.com/advisories/25200/ SA25232: http://secunia.com/advisories/25232/ SA25383: http://secunia.com/advisories/25383/ SA25721: http://secunia.com/advisories/25721/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.25

sources: NVD: CVE-2007-3744 // JVNDB: JVNDB-2007-002336 // BID: 25159 // VULHUB: VHN-27106 // PACKETSTORM: 58363 // PACKETSTORM: 108968 // PACKETSTORM: 58225

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.4.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.9

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.10

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.10

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:20070731

Trust: 0.8

vendor:applemodel:mac os xscope:ltversion:10.4.10

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

sources: BID: 25159 // JVNDB: JVNDB-2007-002336 // CNNVD: CNNVD-200708-031 // NVD: CVE-2007-3744

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3744
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3744
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-031
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27106
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3744
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27106
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27106 // JVNDB: JVNDB-2007-002336 // CNNVD: CNNVD-200708-031 // NVD: CVE-2007-3744

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-27106 // JVNDB: JVNDB-2007-002336 // NVD: CVE-2007-3744

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-200708-031

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200708-031

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002336

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27106

PATCH

title:APPLE-SA-2007-07-31url:http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-002336

EXTERNAL IDS

db:NVDid:CVE-2007-3744

Trust: 3.0

db:BIDid:25159

Trust: 2.0

db:SECUNIAid:26235

Trust: 1.8

db:VUPENid:ADV-2007-2732

Trust: 1.7

db:SECTRACKid:1018488

Trust: 1.7

db:JVNDBid:JVNDB-2007-002336

Trust: 0.8

db:CNNVDid:CNNVD-200708-031

Trust: 0.7

db:XFid:35733

Trust: 0.6

db:APPLEid:APPLE-SA-2007-07-31

Trust: 0.6

db:IDEFENSEid:20070807 APPLE MAC OS X MDNSRESPONDER HTTP REQUEST HEAP OVERFLOW VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:58363

Trust: 0.2

db:VULHUBid:VHN-27106

Trust: 0.1

db:PACKETSTORMid:108968

Trust: 0.1

db:PACKETSTORMid:58225

Trust: 0.1

sources: VULHUB: VHN-27106 // BID: 25159 // JVNDB: JVNDB-2007-002336 // PACKETSTORM: 58363 // PACKETSTORM: 108968 // PACKETSTORM: 58225 // CNNVD: CNNVD-200708-031 // NVD: CVE-2007-3744

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=306172

Trust: 1.9

url:http://lists.apple.com/archives/security-announce//2007/jul/msg00004.html

Trust: 1.7

url:http://www.securityfocus.com/bid/25159

Trust: 1.7

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=573

Trust: 1.7

url:http://www.securitytracker.com/id?1018488

Trust: 1.7

url:http://secunia.com/advisories/26235

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2732

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35733

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3744

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3744

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2732

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35733

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:/archive/1/475770

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3744

Trust: 0.2

url:https://www.digit-labs.org.

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://developer.apple.com/opensource/internet/bonjour.html

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3630

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3828

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2326

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3744

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201201-05.xml

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2326

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3630

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20070071039server.html

Trust: 0.1

url:http://secunia.com/advisories/25721/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700710410serverppc.html

Trust: 0.1

url:http://secunia.com/advisories/23893/

Trust: 0.1

url:http://secunia.com/advisories/24440/

Trust: 0.1

url:http://secunia.com/advisories/24732/

Trust: 0.1

url:http://secunia.com/advisories/20406/

Trust: 0.1

url:http://secunia.com/advisories/23195/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/15047/

Trust: 0.1

url:http://secunia.com/advisories/25383/

Trust: 0.1

url:http://secunia.com/advisories/24542/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20070071039.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700710410universal.html

Trust: 0.1

url:http://secunia.com/advisories/13237/

Trust: 0.1

url:http://secunia.com/advisories/25800/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/24814/

Trust: 0.1

url:http://secunia.com/advisories/25200/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700710410serveruniversal.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700710410ppc.html

Trust: 0.1

url:http://secunia.com/advisories/21354/

Trust: 0.1

url:http://secunia.com/advisories/24505/

Trust: 0.1

url:http://secunia.com/advisories/25232/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/25123/

Trust: 0.1

url:http://secunia.com/advisories/26235/

Trust: 0.1

url:http://secunia.com/advisories/16987/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/advisories/22588/

Trust: 0.1

url:http://secunia.com/advisories/24356/

Trust: 0.1

sources: VULHUB: VHN-27106 // BID: 25159 // JVNDB: JVNDB-2007-002336 // PACKETSTORM: 58363 // PACKETSTORM: 108968 // PACKETSTORM: 58225 // CNNVD: CNNVD-200708-031 // NVD: CVE-2007-3744

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200708-031

SOURCES

db:VULHUBid:VHN-27106
db:BIDid:25159
db:JVNDBid:JVNDB-2007-002336
db:PACKETSTORMid:58363
db:PACKETSTORMid:108968
db:PACKETSTORMid:58225
db:CNNVDid:CNNVD-200708-031
db:NVDid:CVE-2007-3744

LAST UPDATE DATE

2025-04-10T21:57:39.220000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27106date:2017-07-29T00:00:00
db:BIDid:25159date:2007-08-08T00:34:00
db:JVNDBid:JVNDB-2007-002336date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200708-031date:2007-08-03T00:00:00
db:NVDid:CVE-2007-3744date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27106date:2007-08-03T00:00:00
db:BIDid:25159date:2007-08-01T00:00:00
db:JVNDBid:JVNDB-2007-002336date:2012-06-26T00:00:00
db:PACKETSTORMid:58363date:2007-08-08T08:07:00
db:PACKETSTORMid:108968date:2012-01-23T16:17:51
db:PACKETSTORMid:58225date:2007-08-08T04:01:26
db:CNNVDid:CNNVD-200708-031date:2006-06-01T00:00:00
db:NVDid:CVE-2007-3744date:2007-08-03T10:17:00