ID

VAR-200711-0181


CVE

CVE-2007-6145


TITLE

Hitachi JP1/File Transmission Server/FTP Authentication Bypass Vulnerability

Trust: 1.1

sources: BID: 26530 // JVNDB: JVNDB-2007-000999

DESCRIPTION

Unspecified vulnerability in Hitachi JP1/File Transmission Server/FTP 01-00 through 08-10-01 allows remote attackers to bypass authentication and "view files" via unspecified vectors. Attackers can exploit this issue to bypass security restrictions and obtain potentially sensitive information that could aid in further attacks. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: JP1/File Transmission Server/FTP Authentication Bypass and DoS SECUNIA ADVISORY ID: SA27735 VERIFY ADVISORY: http://secunia.com/advisories/27735/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote SOFTWARE: Hitachi JP1/File Transmission Server/FTP http://secunia.com/product/3821/ DESCRIPTION: Two vulnerabilities have been reported in JP1/File Transmission Server/FTP, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to bypass certain security restrictions. The vulnerability affects HP-UX, HP-UX(IPF), AIX, Solaris, Linux, Linux(IPF), HP-UX(English version), and HI-UX/WE2. 2) An error in the processing of an unspecified FTP command can be exploited to stop the FTP service via a specially crafted file. The vulnerability affects Windows(x86), Windows(IPF), Windows(English version), and Windows9X. SOLUTION: Update to the latest versions (please see vendor advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS07-037_e/index-e.html http://www.hitachi-support.com/security_e/vuls_e/HS07-038_e/index-e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-6145 // JVNDB: JVNDB-2007-000999 // BID: 26530 // PACKETSTORM: 61096

AFFECTED PRODUCTS

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-02

Trust: 1.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-01

Trust: 1.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01-01

Trust: 1.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01-02

Trust: 1.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-03

Trust: 1.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:neversion:08-10-02

Trust: 1.8

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_c

Trust: 1.6

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_b

Trust: 1.6

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01_e

Trust: 1.6

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_00

Trust: 1.6

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/ascope: - version: -

Trust: 1.5

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01-03

Trust: 1.5

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-01

Trust: 1.5

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-00

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:neversion:07-50-03

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:06-00

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-02

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10-01

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-10

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00

Trust: 1.2

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-04

Trust: 1.2

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01_d

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_g

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_d

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_50

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_f

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00_04

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_c

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_10_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_01_02

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00_02

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_f

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_01_03

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_11

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_50_02

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00_03

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_01_04

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_00_b

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01_b

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_50_04

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_b

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_c

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_d

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_f

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_20_b

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_e

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_50_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_20

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00_05

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_00_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_01_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_10_b

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_h

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_20_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_e

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_01_c

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_10_c

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_10_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_e

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_g

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_00

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:01_00

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_02_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_11_a

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_50_03

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_d

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_10

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:08_00_01

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:06_00

Trust: 1.0

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:05_10_b

Trust: 1.0

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/bscope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/cscope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/ascope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:06-02

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/cscope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/ascope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/ascope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/bscope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/dscope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/escope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-10

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/escope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:06-01

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/dscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01-04

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:neversion:07-50-05

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-11-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-01-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-00-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/b hp-uxscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-11

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:08-01-04

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (linux ipscope:eqversion:08-00-04-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-20-/b (linux ipscope:eqversion: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-05

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:08-10-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:08-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-20-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-20-/cscope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (hp-ux engliscope:eqversion:08-00-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (linux ipscope:eqversion:08-01-03-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:08-00-04

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (hp-ux engliscope:eqversion:07-00-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (hp-ux engliscope:eqversion:07-50-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (hp-ux engliscope:eqversion:06-00-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (linux ipscope:eqversion:08-10-01-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (hp-ux enscope:eqversion:08-00-01-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:01-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:08-10

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/a hp-uxscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-20-

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp hp-uxscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-04

Trust: 0.3

sources: BID: 26530 // JVNDB: JVNDB-2007-000999 // CNNVD: CNNVD-200711-376 // NVD: CVE-2007-6145

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6145
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2007-000999
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-376
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2007-6145
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2007-000999
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2007-000999 // CNNVD: CNNVD-200711-376 // NVD: CVE-2007-6145

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2007-000999 // NVD: CVE-2007-6145

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-376

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200711-376

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000999

PATCH

title:HS07-037url:http://www.hitachi-support.com/security_e/vuls_e/HS07-037_e/index-e.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000999

EXTERNAL IDS

db:NVDid:CVE-2007-6145

Trust: 2.7

db:BIDid:26530

Trust: 2.7

db:SECUNIAid:27735

Trust: 2.6

db:HITACHIid:HS07-037

Trust: 2.0

db:VUPENid:ADV-2007-3957

Trust: 1.6

db:OSVDBid:42353

Trust: 1.6

db:XFid:38610

Trust: 1.4

db:JVNDBid:JVNDB-2007-000999

Trust: 0.8

db:CNNVDid:CNNVD-200711-376

Trust: 0.6

db:HITACHIid:HS07-038

Trust: 0.1

db:PACKETSTORMid:61096

Trust: 0.1

sources: BID: 26530 // JVNDB: JVNDB-2007-000999 // PACKETSTORM: 61096 // CNNVD: CNNVD-200711-376 // NVD: CVE-2007-6145

REFERENCES

url:http://secunia.com/advisories/27735

Trust: 2.4

url:http://www.securityfocus.com/bid/26530

Trust: 2.4

url:http://www.hitachi-support.com/security_e/vuls_e/hs07-037_e/index-e.html

Trust: 2.0

url:http://osvdb.org/42353

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/3957

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/38610

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3957

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38610

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6145

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-6145

Trust: 0.8

url:http://www.hds.com/products/storage-software/hitachi-device-manager.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/prod/jp1/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://www.hitachi-support.com/security_e/vuls_e/hs07-038_e/index-e.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/3821/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/27735/

Trust: 0.1

sources: BID: 26530 // JVNDB: JVNDB-2007-000999 // PACKETSTORM: 61096 // CNNVD: CNNVD-200711-376 // NVD: CVE-2007-6145

CREDITS

The vendor disclosed this issue.

Trust: 0.9

sources: BID: 26530 // CNNVD: CNNVD-200711-376

SOURCES

db:BIDid:26530
db:JVNDBid:JVNDB-2007-000999
db:PACKETSTORMid:61096
db:CNNVDid:CNNVD-200711-376
db:NVDid:CVE-2007-6145

LAST UPDATE DATE

2025-04-10T22:57:27.182000+00:00


SOURCES UPDATE DATE

db:BIDid:26530date:2007-12-18T20:05:00
db:JVNDBid:JVNDB-2007-000999date:2008-05-21T00:00:00
db:CNNVDid:CNNVD-200711-376date:2007-11-28T00:00:00
db:NVDid:CVE-2007-6145date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:26530date:2007-11-22T00:00:00
db:JVNDBid:JVNDB-2007-000999date:2008-05-21T00:00:00
db:PACKETSTORMid:61096date:2007-11-26T16:56:43
db:CNNVDid:CNNVD-200711-376date:2007-11-27T00:00:00
db:NVDid:CVE-2007-6145date:2007-11-27T19:46:00