ID

VAR-200901-0247


CVE

CVE-2009-0002


TITLE

Apple QuickTime Heap overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-001603

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QTVR movie file with crafted THKD atoms. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of 'tkhd' atoms found inside QuickTimeVR files. Improper validation of the transform matrix data results in a heap chunk header overwrite leading to arbitrary code execution under the context of the currently logged in user. Apple QuickTime is prone to a heap-based buffer-overflow issue because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted movie file. Failed exploit attempts likely result in denial-of-service conditions. This issue affects Apple QuickTime running on Microsoft Windows Vista, Windows XP SP2 and SP3, and Mac OS X. Apple QuickTime is a very popular multimedia player. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA09-022A Apple QuickTime Updates for Multiple Vulnerabilities Original release date: January 22, 2009 Last revised: -- Source: US-CERT Systems Affected * Apple QuickTime 7.5 for Windows and Mac OS X Overview Apple has released QuickTime 7.6 to correct multiple vulnerabilities affecting QuickTime for Mac OS X and Windows. I. Description Apple QuickTime 7.6 addresses a number of vulnerabilities affecting QuickTime. This file could be hosted on a web page or sent via email. II. Impact The impacts of these vulnerabilities vary. III. This and other updates are available via Software Update or via Apple Downloads. IV. References * About the security content of QuickTime 7.6 - <http://support.apple.com/kb/HT3403> * Apple Support Downloads - <http://support.apple.com/downloads/> * Mac OS X - updating your software - <http://support.apple.com/kb/HT1338?viewlocale=en_US> * Securing Your Web Browser - <https://www.us-cert.gov/reading_room/securing_browser/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA09-022A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA09-022A Feedback VU#703068" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 22, 2009: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSXj25HIHljM+H4irAQKNIgf+LSBKBzHWdjxmJgYw3vYmAXtwpUxAVThs Ma4vIB1vSjv8Us83S2XrKIGcKrdPgQgeS7Vji9WRMmlzEv/AYlFJseqq17ufGely 5YosATUh+C0SjY6OAYeJNYMws7fgGcGJagtfQp0gJTRLruknEoB/iqlASBQ7MtNg 7viHKIR8r2BxCNB1A4ir1kzPELIHFF/pmmuaD+E2PnxH1XtYLM9b9t6xbkjie2PG vEwv7JCGH/RrJtst480ZMIHOghsZ0ONoMkTjZB7o5S0ww3guktGOMB+/QiZI8eFB KbU6nB6JGscZ8Fb1E4K3yOU9MvpzEfurIvYmyMcAdxFCiq5CSUjOug== =B5D3 -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA33632 VERIFY ADVISORY: http://secunia.com/advisories/33632/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/advisories/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 1) A boundary error exists in the processing of RTSP URLs. This can be exploited to cause a heap-based buffer overflow when a specially crafted RTSP URL is accessed. This can be exploited to cause a heap-based buffer overflow via a specially crafted QTVR file. 6) A signedness error exists within the processing of the MDAT atom when handling Cinepak encoded movie files. 7) An error exists within the function JPEG_DComponentDispatch() when processing the image width data in JPEG atoms embedded in STSD atoms. Successful exploitation of these vulnerabilities may allow execution of arbitrary code. SOLUTION: Update to version 7.6. QuickTime 7.6 for Windows: http://support.apple.com/downloads/QuickTime_7_6_for_Windows QuickTime 7.6 for Leopard: http://support.apple.com/downloads/QuickTime_7_6_for_Leopard QuickTime 7.6 for Tiger: http://support.apple.com/downloads/QuickTime_7_6_for_Tiger PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Attila Suszter 4) Chad Dougherty, CERT Coordination Center 5) Dave Soldera, NGS Software 2, 3, 6, 7) An anonymous person, reported via ZDI ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3403 ZDI: http://www.zerodayinitiative.com/advisories/ZDI-09-005/ http://www.zerodayinitiative.com/advisories/ZDI-09-006/ http://www.zerodayinitiative.com/advisories/ZDI-09-007/ http://www.zerodayinitiative.com/advisories/ZDI-09-008/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ZDI-09-005: Apple QuickTime VR Track Header Atom Heap Corruption Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-005 January 21, 2009 -- CVE ID: CVE-2009-0002 -- Affected Vendors: Apple -- Affected Products: Apple Quicktime -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 6449. More details can be found at: http://support.apple.com/kb/HT3403 -- Disclosure Timeline: 2008-09-16 - Vulnerability reported to vendor 2009-01-21 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is being sent by 3Com for the sole use of the intended recipient(s) and may contain confidential, proprietary and/or privileged information. Any unauthorized review, use, disclosure and/or distribution by any recipient is prohibited. If you are not the intended recipient, please delete and/or destroy all copies of this message regardless of form and any included attachments and notify 3Com immediately by contacting the sender via reply e-mail or forwarding to 3Com at postmaster@3com.com. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.88

sources: NVD: CVE-2009-0002 // JVNDB: JVNDB-2009-001603 // ZDI: ZDI-09-005 // BID: 33384 // VULHUB: VHN-37448 // PACKETSTORM: 74263 // PACKETSTORM: 74228 // PACKETSTORM: 74202

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.5.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:ltversion:7.6

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktimescope:eqversion:3

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

sources: ZDI: ZDI-09-005 // BID: 33384 // JVNDB: JVNDB-2009-001603 // CNNVD: CNNVD-200901-259 // NVD: CVE-2009-0002

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0002
value: HIGH

Trust: 1.0

NVD: CVE-2009-0002
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200901-259
value: CRITICAL

Trust: 0.6

VULHUB: VHN-37448
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0002
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37448
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37448 // JVNDB: JVNDB-2009-001603 // CNNVD: CNNVD-200901-259 // NVD: CVE-2009-0002

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-37448 // JVNDB: JVNDB-2009-001603 // NVD: CVE-2009-0002

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-259

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200901-259

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001603

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-37448

PATCH

title:HT3403url:http://support.apple.com/kb/HT3403

Trust: 1.5

sources: ZDI: ZDI-09-005 // JVNDB: JVNDB-2009-001603

EXTERNAL IDS

db:NVDid:CVE-2009-0002

Trust: 3.6

db:ZDIid:ZDI-09-005

Trust: 2.9

db:USCERTid:TA09-022A

Trust: 2.0

db:BIDid:33384

Trust: 2.0

db:SECUNIAid:33632

Trust: 1.9

db:VUPENid:ADV-2009-0212

Trust: 1.7

db:OSVDBid:51525

Trust: 1.7

db:USCERTid:SA09-022A

Trust: 0.8

db:JVNDBid:JVNDB-2009-001603

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-382

Trust: 0.7

db:CNNVDid:CNNVD-200901-259

Trust: 0.7

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5646

Trust: 0.6

db:APPLEid:APPLE-SA-2009-01-21

Trust: 0.6

db:BUGTRAQid:20090121 ZDI-09-005: APPLE QUICKTIME VR TRACK HEADER ATOM HEAP CORRUPTION VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:74202

Trust: 0.2

db:VULHUBid:VHN-37448

Trust: 0.1

db:PACKETSTORMid:74263

Trust: 0.1

db:ZDIid:ZDI-09-008

Trust: 0.1

db:ZDIid:ZDI-09-006

Trust: 0.1

db:ZDIid:ZDI-09-007

Trust: 0.1

db:PACKETSTORMid:74228

Trust: 0.1

sources: ZDI: ZDI-09-005 // VULHUB: VHN-37448 // BID: 33384 // JVNDB: JVNDB-2009-001603 // PACKETSTORM: 74263 // PACKETSTORM: 74228 // PACKETSTORM: 74202 // CNNVD: CNNVD-200901-259 // NVD: CVE-2009-0002

REFERENCES

url:http://support.apple.com/kb/ht3403

Trust: 2.9

url:http://www.zerodayinitiative.com/advisories/zdi-09-005/

Trust: 2.1

url:http://www.us-cert.gov/cas/techalerts/ta09-022a.html

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2009/jan/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/33384

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2009-01/0210.html

Trust: 1.7

url:http://osvdb.org/51525

Trust: 1.7

url:http://secunia.com/advisories/33632

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5646

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0212

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0002

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-022a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-04/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0002

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa09-022a.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2009/0212

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5646

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:/archive/1/500299

Trust: 0.3

url:https://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://support.apple.com/kb/ht1338?viewlocale=en_us>

Trust: 0.1

url:http://support.apple.com/kb/ht3403>

Trust: 0.1

url:http://support.apple.com/downloads/>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-022a.html>

Trust: 0.1

url:http://secunia.com/advisories/product/5090/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-008/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-007/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://support.apple.com/downloads/quicktime_7_6_for_leopard

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-006/

Trust: 0.1

url:http://support.apple.com/downloads/quicktime_7_6_for_windows

Trust: 0.1

url:http://support.apple.com/downloads/quicktime_7_6_for_tiger

Trust: 0.1

url:http://secunia.com/advisories/33632/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-005

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0002

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

sources: ZDI: ZDI-09-005 // VULHUB: VHN-37448 // BID: 33384 // JVNDB: JVNDB-2009-001603 // PACKETSTORM: 74263 // PACKETSTORM: 74228 // PACKETSTORM: 74202 // CNNVD: CNNVD-200901-259 // NVD: CVE-2009-0002

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-09-005

SOURCES

db:ZDIid:ZDI-09-005
db:VULHUBid:VHN-37448
db:BIDid:33384
db:JVNDBid:JVNDB-2009-001603
db:PACKETSTORMid:74263
db:PACKETSTORMid:74228
db:PACKETSTORMid:74202
db:CNNVDid:CNNVD-200901-259
db:NVDid:CVE-2009-0002

LAST UPDATE DATE

2025-04-10T20:22:39.869000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-005date:2009-01-21T00:00:00
db:VULHUBid:VHN-37448date:2018-10-30T00:00:00
db:BIDid:33384date:2009-01-29T18:19:00
db:JVNDBid:JVNDB-2009-001603date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200901-259date:2009-03-04T00:00:00
db:NVDid:CVE-2009-0002date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-005date:2009-01-21T00:00:00
db:VULHUBid:VHN-37448date:2009-01-21T00:00:00
db:BIDid:33384date:2009-01-21T00:00:00
db:JVNDBid:JVNDB-2009-001603date:2009-07-08T00:00:00
db:PACKETSTORMid:74263date:2009-01-23T04:59:56
db:PACKETSTORMid:74228date:2009-01-22T13:46:43
db:PACKETSTORMid:74202date:2009-01-21T22:35:57
db:CNNVDid:CNNVD-200901-259date:2009-01-21T00:00:00
db:NVDid:CVE-2009-0002date:2009-01-21T20:30:00.267