ID

VAR-200807-0646


CVE

CVE-2008-2320


TITLE

Apple Mac OS X of CarbonCore Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2008-001597

DESCRIPTION

Stack-based buffer overflow in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.4, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long filename to the file management API. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed attempts will likely cause denial-of-service conditions. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-005. The security update addresses a total of six new vulnerabilities that affect the CarbonCore, CoreGraphics, Data Detectors Engine, Disk Utility, OpenLDAP, and QuickLook components of Mac OS X. The advisory also contains security updates for 11 previously reported issues. 1) A vulnerability in BIND can be exploited to poison the DNS cache. For more information: SA30973 2) A boundary error exists in CarbonCore when handling filenames. This can be exploited to cause a stack-based buffer overflow via overly long filenames. Successful exploitation of the vulnerability may allow execution of arbitrary code. 3) Multiple errors exist in CoreGraphics when processing received arguments. These can be exploited to trigger a memory corruption by e.g. tricking a user into visiting a specially crafted website. Successful exploitation of the vulnerability may allow execution of arbitrary code. 4) An integer overflow error exists in CoreGraphics when handling PDF files. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation of the vulnerability may allow execution of arbitrary code. 5) Multiple errors in QuickLook when downloading Microsoft Office files can be exploited to cause a memory corruption. Successful exploitation of the vulnerability may allow execution of arbitrary code. 6) An error exists in the Data Detectors engine when viewing a specially crafted message. This can be exploited to consume overly large resources and trigger an application using the engine to terminate. 7) The problem is that the "Repair Permissions" tool included in Disk Utility sets the "setuid" bit on "/usr/bin/emacs". This can be exploited to execute arbitrary commands with system privileges. 8) An error in OpenLDAP when parsing ASN.1 BER encoded packets can be exploited to cause a DoS. For more information: SA30853 9) A boundary error exists in the OpenSSL "SSL_get_shared_ciphers()" function. For more information see vulnerability #4 in: SA22130 10) Some vulnerabilities in PHP can be exploited malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. For more information: SA30048 11) Two vulnerabilities in rsync can be exploited by malicious users to bypass certain security restrictions. For more information: SA27863 SOLUTION: Apply Security Update 2008-005. Security Update 2008-005 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008005serverppc.html Security Update 2008-005 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008005serverintel.html Security Update 2008-005 (PPC): http://www.apple.com/support/downloads/securityupdate2008005ppc.html Security Update 2008-005 (Intel): http://www.apple.com/support/downloads/securityupdate2008005intel.html Security Update 2008-005 (Leopard): http://www.apple.com/support/downloads/securityupdate2008005leopard.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Dan Kaminsky of IOActive 2) Thomas Raffetseder of the International Secure Systems Lab and Sergio 'shadown' Alvarez of n.runs AG. 3) Michal Zalewski, Google 4) Pariente Kobi, reported via iDefense 7) Anton Rang and Brian Timares ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2647 OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130/ SA27863: http://secunia.com/advisories/27863/ SA30048: http://secunia.com/advisories/30048/ SA30973: http://secunia.com/advisories/30973/ SA30853: http://secunia.com/advisories/30853/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35379 VERIFY ADVISORY: http://secunia.com/advisories/35379/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to disclose sensitive information or compromise a user's system. 1) An error in the handling of TrueType fonts can be exploited to corrupt memory when a user visits a web site embedding a specially crafted font. 2) Some vulnerabilities in FreeType can potentially be exploited to compromise a user's system. For more information: SA33970 4) An error in the processing of external entities in XML files can be exploited to read files from the user's system when a users visits a specially crafted web page. Other vulnerabilities have also been reported of which some may also affect Safari version 3.x. SOLUTION: Upgrade to Safari version 4, which fixes the vulnerabilities. PROVIDED AND/OR DISCOVERED BY: 1-3) Tavis Ormandy 4) Chris Evans of Google Inc

Trust: 2.43

sources: NVD: CVE-2008-2320 // JVNDB: JVNDB-2008-001597 // BID: 30487 // BID: 30483 // VULHUB: VHN-32445 // PACKETSTORM: 68761 // PACKETSTORM: 78192

AFFECTED PRODUCTS

vendor:applemodel:carboncorescope:eqversion:*

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:iosscope:eqversion:1.0 to 2.2.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 2.2.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.5.4

Trust: 0.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.4

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 0.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.3

sources: BID: 30487 // BID: 30483 // JVNDB: JVNDB-2008-001597 // CNNVD: CNNVD-200808-024 // NVD: CVE-2008-2320

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2320
value: HIGH

Trust: 1.0

NVD: CVE-2008-2320
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200808-024
value: CRITICAL

Trust: 0.6

VULHUB: VHN-32445
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2320
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2008-2320
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-32445
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32445 // JVNDB: JVNDB-2008-001597 // CNNVD: CNNVD-200808-024 // NVD: CVE-2008-2320

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-32445 // JVNDB: JVNDB-2008-001597 // NVD: CVE-2008-2320

THREAT TYPE

network

Trust: 0.6

sources: BID: 30487 // BID: 30483

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200808-024

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001597

PATCH

title:HT3613url:http://support.apple.com/kb/HT3613

Trust: 0.8

title:HT3639url:http://support.apple.com/kb/HT3639

Trust: 0.8

title:HT2647url:http://support.apple.com/kb/HT2647

Trust: 0.8

title:HT2647url:http://support.apple.com/kb/HT2647?viewlocale=ja_JP

Trust: 0.8

title:HT3613url:http://support.apple.com/kb/HT3613?viewlocale=ja_JP

Trust: 0.8

title:HT3639url:http://support.apple.com/kb/HT3639?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001597

EXTERNAL IDS

db:NVDid:CVE-2008-2320

Trust: 3.1

db:BIDid:30487

Trust: 2.8

db:SECUNIAid:31326

Trust: 2.6

db:BIDid:30483

Trust: 2.0

db:SECUNIAid:35379

Trust: 1.8

db:VUPENid:ADV-2009-1522

Trust: 1.7

db:VUPENid:ADV-2008-2268

Trust: 1.7

db:VUPENid:ADV-2009-1621

Trust: 1.7

db:SECTRACKid:1020602

Trust: 1.7

db:XFid:44126

Trust: 1.4

db:JVNDBid:JVNDB-2008-001597

Trust: 0.8

db:APPLEid:APPLE-SA-2009-06-17-1

Trust: 0.6

db:APPLEid:APPLE-SA-2009-06-08-1

Trust: 0.6

db:APPLEid:APPLE-SA-2008-07-31

Trust: 0.6

db:BUGTRAQid:20080801 N.RUNS-SA-2008.005 - APPLE INC. - CORESERVICES FRAMEWORKÂ??S CARBONCORE FRAMEWORK - ARBITRARY CODE EXECUTION (REMOTE)

Trust: 0.6

db:CNNVDid:CNNVD-200808-024

Trust: 0.6

db:VULHUBid:VHN-32445

Trust: 0.1

db:PACKETSTORMid:68761

Trust: 0.1

db:PACKETSTORMid:78192

Trust: 0.1

sources: VULHUB: VHN-32445 // BID: 30487 // BID: 30483 // JVNDB: JVNDB-2008-001597 // PACKETSTORM: 68761 // PACKETSTORM: 78192 // CNNVD: CNNVD-200808-024 // NVD: CVE-2008-2320

REFERENCES

url:http://www.securityfocus.com/bid/30487

Trust: 2.5

url:http://secunia.com/advisories/31326

Trust: 2.5

url:http://support.apple.com/kb/ht3613

Trust: 1.8

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/bid/30483

Trust: 1.7

url:http://support.apple.com/kb/ht3639

Trust: 1.7

url:http://www.securitytracker.com/id?1020602

Trust: 1.7

url:http://secunia.com/advisories/35379

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1522

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1621

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/2268

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/44126

Trust: 1.4

url:http://www.securityfocus.com/archive/1/495040/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44126

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2320

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2320

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/495040/100/0/threaded

Trust: 0.6

url:http://www.nruns.com/security_advisory_macosx_coreservices_framework_carboncore_framework_code_execution.php

Trust: 0.3

url:/archive/1/495040

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/advisories/27863/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://support.apple.com/kb/ht2647

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005leopard.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverintel.html

Trust: 0.1

url:http://secunia.com/advisories/22130/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30048/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005intel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverppc.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30853/

Trust: 0.1

url:http://secunia.com/advisories/30973/

Trust: 0.1

url:http://secunia.com/advisories/31326/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005ppc.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/advisories/35379/

Trust: 0.1

url:http://secunia.com/advisories/33970/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/34723/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://scary.beasts.org/security/cesa-2009-006.html

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-32445 // BID: 30487 // BID: 30483 // JVNDB: JVNDB-2008-001597 // PACKETSTORM: 68761 // PACKETSTORM: 78192 // CNNVD: CNNVD-200808-024 // NVD: CVE-2008-2320

CREDITS

Pariente Kobi

Trust: 0.6

sources: CNNVD: CNNVD-200808-024

SOURCES

db:VULHUBid:VHN-32445
db:BIDid:30487
db:BIDid:30483
db:JVNDBid:JVNDB-2008-001597
db:PACKETSTORMid:68761
db:PACKETSTORMid:78192
db:CNNVDid:CNNVD-200808-024
db:NVDid:CVE-2008-2320

LAST UPDATE DATE

2025-04-10T21:48:16.426000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32445date:2018-10-11T00:00:00
db:BIDid:30487date:2009-06-17T23:39:00
db:BIDid:30483date:2008-08-01T17:57:00
db:JVNDBid:JVNDB-2008-001597date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200808-024date:2009-06-23T00:00:00
db:NVDid:CVE-2008-2320date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-32445date:2008-08-04T00:00:00
db:BIDid:30487date:2008-07-31T00:00:00
db:BIDid:30483date:2008-07-31T00:00:00
db:JVNDBid:JVNDB-2008-001597date:2008-09-03T00:00:00
db:PACKETSTORMid:68761date:2008-08-01T22:41:42
db:PACKETSTORMid:78192date:2009-06-10T12:30:42
db:CNNVDid:CNNVD-200808-024date:2008-07-31T00:00:00
db:NVDid:CVE-2008-2320date:2008-08-04T01:41:00