ID

VAR-200902-0500


CVE

CVE-2009-0216


TITLE

ge_fanuc ifix Bypass access restriction vulnerability

Trust: 0.8

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200902-293

DESCRIPTION

GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module. Vulnerabilities in the way GE Fanuc iFIX handles authentication could allow a remote attacker to log on to the system with elevated privileges. Microsoft Windows fails to properly handle the NoDriveTypeAutoRun registry value, which may prevent Windows from effectively disabling AutoRun and AutoPlay features. GE Fanuc iFIX Is Human Machine Interface With components, Microsoft Windows CE , NT , 2000 , Server 2003 , XP and Vista Work on SCADA client / Server software. iFIX Vulnerabilities exist in authentication. The user name and password are stored in a local file on the client side, and the password is encrypted with a low-strength algorithm. GE Fanuc according to: Attackers can gain copies of this file in two ways. The first way requires that an attacker have an interactive session with the computer containing the file, such as a direct login, or through a remote terminal session, VNC, or some other remote session providing access to a command shell. Using the shell, the attacker can simply copy the file and extract the passwords at some later point. Another way an attacker can gain access to this file is by intercepting the file over the network. This can occur if the file is shared between two computers using Microsoft WindowsR network sharing. In this case, an attacker may be able to recreate the file by using a network sniffer to monitor network traffic between them. iFIX Since authentication is performed within the client, an attacker could tamper and replace the authentication module. GE Fanuc according to: Authentication and authorization of users are implemented through certain program modules. These modules can be modified at the binary level to bypass user authentication. To exploit this type of attack, an attacker needs to be able to launch unauthorized applications from an interactive shell. Also, iFIX Is Technical Cyber Security Alert TA09-020A Published on “Microsoft Windows Notes on disabling the auto-execution function ” There is a possibility of being affected. Any code executed using the auto-execution function iFIX Enviroment Protection May result in the authentication module being tampered with and replaced.An attacker could gain access to a file containing authentication information or intercept network traffic. As a result, by the attacker iFIX Unauthorized access to the system is possible. GE Fanuc iFIX 5.0 are earlier are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA09-020A Microsoft Windows Does Not Disable AutoRun Properly Original release date: January 20, 2009 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows Overview Disabling AutoRun on Microsoft Windows systems can help prevent the spread of malicious code. However, Microsoft's guidelines for disabling AutoRun are not fully effective, which could be considered a vulnerability. I. Description Microsoft Windows includes an AutoRun feature, which can automatically run code when removable devices are connected to the computer. AutoRun (and the closely related AutoPlay) can unexpectedly cause arbitrary code execution in the following situations: * A removable device is connected to a computer. This includes, but is not limited to, inserting a CD or DVD, connecting a USB or Firewire device, or mapping a network drive. This connection can result in code execution without any additional user interaction. * A user clicks the drive icon for a removable device in Windows Explorer. Rather than exploring the drive's contents, this action can cause code execution. * The user selects an option from the AutoPlay dialog that is displayed when a removable device is connected. Malicious software, such as W32.Downadup, is using AutoRun to spread. Disabling AutoRun, as specified in the CERT/CC Vulnerability Analysis blog, is an effective way of helping to prevent the spread of malicious code. It will, however, disable Media Change Notification (MCN) messages, which may prevent Windows from detecting when a CD or DVD is changed. II. Impact By placing an Autorun.inf file on a device, an attacker may be able to automatically execute arbitrary code when the device is connected to a Windows system. Code execution may also take place when the user attempts to browse to the software location with Windows Explorer. III. We recommend restarting Windows after making the registry change so that any cached mount points are reinitialized in a way that ignores the Autorun.inf file. Alternatively, the following registry key may be deleted: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 Once these changes have been made, all of the AutoRun code execution scenarios described above will be mitigated because Windows will no longer parse Autorun.inf files to determine which actions to take. Further details are available in the CERT/CC Vulnerability Analysis blog. Thanks to Nick Brown and Emin Atac for providing the workaround. IV. References * The Dangers of Windows AutoRun - <http://www.cert.org/blogs/vuls/2008/04/the_dangers_of_windows_autorun.html> * US-CERT Vulnerability Note VU#889747 - <http://www.kb.cert.org/vuls/id/889747> * Nick Brown's blog: Memory stick worms - <http://nick.brown.free.fr/blog/2007/10/memory-stick-worms> * TR08-004 Disabling Autorun - <http://www.publicsafety.gc.ca/prg/em/ccirc/2008/tr08-004-eng.aspx> * How to Enable or Disable Automatically Running CD-ROMs - <http://support.microsoft.com/kb/155217> * NoDriveTypeAutoRun - <http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/91525.mspx> * Autorun.inf Entries - <http://msdn.microsoft.com/en-us/library/bb776823(VS.85).aspx> * W32.Downadup - <http://www.symantec.com/security_response/writeup.jsp?docid=2008-112203-2408-99> * MS08-067 Worm, Downadup/Conflicker - <http://www.f-secure.com/weblog/archives/00001576.html> * Social Engineering Autoplay and Windows 7 - <http://www.f-secure.com/weblog/archives/00001586.html> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA09-020A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA09-020A Feedback VU#889747" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 20, 2009: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSXYqQnIHljM+H4irAQL9EAgAwE5XWd+83CTwTl1vAbDW3sNfCaucmj79 VmXJ+GktQorbcp29fktYaQxXZ2A6qBREJ1FfwlM5BT0WftvGppLoQcQO3vbbwEQF M0VG5xZhTOi8tf4nedBDgDj0ENJBgh6C73G5uZfVatQdFi79TFkf9SVe6xn5BkQm 5kKsly0d/CX/te15zZLd05AJVEVilbZcECUeDVAYDvWcQSkx2OsJFb+WkuWI9Loh zkB7uOeZFY9bgrC04nr9DPHpaPFd8KCXegsxjqN1nIraaCabfvNamriqyUFHwAhK sk/DFSjdI6xJ4fXjDQ77wfgLYyTeYQ/b2U/1sqkbOTdCgXqSop5RrA== =6/cp -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Windows Vista "NoDriveTypeAutoRun" Security Issue SECUNIA ADVISORY ID: SA29458 VERIFY ADVISORY: http://secunia.com/advisories/29458/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: Local system OPERATING SYSTEM: Microsoft Windows Vista http://secunia.com/product/13223/ DESCRIPTION: CERT/CC has reported a security issue in Windows Vista, which can be exploited by malicious people to bypass certain security settings. AutoPlay is a feature designed to immediately begin reading from a drive (e.g. run a setup file) when a media is inserted. Successful exploitation may result in execution of arbitrary code, but requires physical access to a vulnerable system or that a user is tricked into inserting a malicious media (e.g. USB device). SOLUTION: Restrict access to affected systems. Do not insert any untrusted media even with the registry key value set to disable AutoPlay for all drives. PROVIDED AND/OR DISCOVERED BY: Will Dormann and Jeff Gennari, CERT/CC. ORIGINAL ADVISORY: US-CERT VU#889747: http://www.kb.cert.org/vuls/id/889747 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . This can be exploited to gain knowledge of user names and passwords by obtaining (e.g. by modifying certain used modules. 3) It is possible to bypass the run-time Environment Protection via the Autoplay feature by attaching an external storage device containing an automatically launched script. Use in a trusted network environment only. Description The presence of a Conficker infection may be detected if a user is unable to surf to the following websites: * http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm * http://www.mcafee.com If a user is unable to reach either of these websites, a Conficker infection may be indicated (the most current variant of Conficker interferes with queries for these sites, preventing a user from visiting them). If a Conficker infection is suspected, the infected system should be removed from the network. Major anti-virus vendors and Microsoft have released several free tools that can verify the presence of a Conficker infection and remove the worm. Instructions for manually removing a Conficker infection from a system have been published by Microsoft in http://support.microsoft.com/kb/962007. Solution US-CERT encourages users to prevent a Conficker infection by ensuring all systems have the MS08-067 patch (part of Security Update KB958644, which was published by Miscrosoft in October 2008), disabling AutoRun functionality (see http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and maintaining up-to-date anti-virus software

Trust: 3.87

sources: NVD: CVE-2009-0216 // CERT/CC: VU#310355 // CERT/CC: VU#889747 // JVNDB: JVNDB-2009-001086 // BID: 33739 // IVD: a6178710-23cc-11e6-abef-000c29c66e3d // PACKETSTORM: 74183 // PACKETSTORM: 64807 // PACKETSTORM: 74973 // PACKETSTORM: 76172

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d

AFFECTED PRODUCTS

vendor:ge fanucmodel:ifixscope:eqversion:2.21

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:4.0

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:2.0

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:3.0

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:3.5

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:2.6

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:2.5

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:4.5

Trust: 1.6

vendor:ge fanucmodel:ifixscope:eqversion:2.2

Trust: 1.6

vendor:ge fanucmodel:ifixscope:lteversion:5.0

Trust: 1.0

vendor:ge fanucmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:ge fanucmodel:hmi/scada - ifixscope:lteversion:5.0

Trust: 0.8

vendor:ge fanucmodel:ifixscope:eqversion:5.0

Trust: 0.6

vendor:gemodel:fanuc ifix pdescope: - version: -

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:5.0

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:4.5

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:4.0

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:3.5

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:3.0

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:2.6

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:2.5

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:2.21

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:2.2

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:2.0

Trust: 0.3

vendor:gemodel:fanuc ifixscope:eqversion:0

Trust: 0.3

vendor:ifixmodel: - scope:eqversion:2.0

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:2.2

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:2.5

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:2.6

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:2.21

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:3.0

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:3.5

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:4.0

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:4.5

Trust: 0.2

vendor:ifixmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d // CERT/CC: VU#310355 // CERT/CC: VU#889747 // BID: 33739 // JVNDB: JVNDB-2009-001086 // CNNVD: CNNVD-200902-293 // NVD: CVE-2009-0216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0216
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#310355
value: 1.62

Trust: 0.8

CARNEGIE MELLON: VU#889747
value: 0.19

Trust: 0.8

NVD: CVE-2009-0216
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200902-293
value: CRITICAL

Trust: 0.6

IVD: a6178710-23cc-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2009-0216
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: a6178710-23cc-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d // CERT/CC: VU#310355 // CERT/CC: VU#889747 // JVNDB: JVNDB-2009-001086 // CNNVD: CNNVD-200902-293 // NVD: CVE-2009-0216

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.8

sources: JVNDB: JVNDB-2009-001086 // NVD: CVE-2009-0216

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-293

TYPE

Trust management

Trust: 0.8

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200902-293

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001086

PATCH

title:Security Issue: CERT Reported Vulnerabilities in iFIX Securityurl:http://support.gefanuc.com/support/index?page=kbchannel&id=S:KB13253&actp=search

Trust: 0.8

sources: JVNDB: JVNDB-2009-001086

EXTERNAL IDS

db:CERT/CCid:VU#310355

Trust: 3.6

db:NVDid:CVE-2009-0216

Trust: 2.9

db:BIDid:33739

Trust: 2.7

db:USCERTid:TA09-020A

Trust: 1.8

db:XFid:48691

Trust: 1.4

db:CERT/CCid:VU#889747

Trust: 1.0

db:CNNVDid:CNNVD-200902-293

Trust: 0.8

db:JVNDBid:JVNDB-2009-001086

Trust: 0.8

db:IVDid:A6178710-23CC-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SECUNIAid:29458

Trust: 0.2

db:SECUNIAid:33909

Trust: 0.2

db:PACKETSTORMid:74183

Trust: 0.1

db:PACKETSTORMid:64807

Trust: 0.1

db:PACKETSTORMid:74973

Trust: 0.1

db:USCERTid:TA09-088A

Trust: 0.1

db:PACKETSTORMid:76172

Trust: 0.1

sources: IVD: a6178710-23cc-11e6-abef-000c29c66e3d // CERT/CC: VU#310355 // CERT/CC: VU#889747 // BID: 33739 // JVNDB: JVNDB-2009-001086 // PACKETSTORM: 74183 // PACKETSTORM: 64807 // PACKETSTORM: 74973 // PACKETSTORM: 76172 // CNNVD: CNNVD-200902-293 // NVD: CVE-2009-0216

REFERENCES

url:http://support.gefanuc.com/support/index?page=kbchannel&id=s:kb13253&actp=search

Trust: 2.8

url:http://www.kb.cert.org/vuls/id/310355

Trust: 2.8

url:http://www.securityfocus.com/bid/33739

Trust: 2.4

url:http://www.mcgrewsecurity.com/2009/02/10/ge-fanuc-releases-info-on-ifix-vulnerabilities-vu-310355/

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta09-020a.html

Trust: 1.6

url:http://xforce.iss.net/xforce/xfdb/48691

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/48691

Trust: 1.0

url:http://www.microsoft.com/technet/security/bulletin/ms08-038.mspx

Trust: 0.8

url:http://support.microsoft.com/kb/967715

Trust: 0.8

url:http://support.microsoft.com/kb/953252

Trust: 0.8

url:http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/91525.mspx

Trust: 0.8

url:http://support.microsoft.com/kb/155217

Trust: 0.8

url:http://support.microsoft.com/kb/895108

Trust: 0.8

url:http://windowshelp.microsoft.com/windows/en-us/help/40f23376-1351-49d5-8d48-5c05d35f2ac81033.mspx

Trust: 0.8

url:http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/30300.mspx

Trust: 0.8

url:http://technet.microsoft.com/en-us/magazine/cc137730.aspx

Trust: 0.8

url:http://nick.brown.free.fr/blog/2007/10/memory-stick-worms

Trust: 0.8

url:http://blogs.technet.com/steriley/archive/2007/10/30/more-on-autorun.aspx

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0216

Trust: 0.8

url:http://jvn.jp/cert/jvnvu310355/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0216

Trust: 0.8

url:http://www.gefanuc.com/

Trust: 0.3

url:http://www.us-cert.gov/cas/techalerts/ta09-020a.html>

Trust: 0.2

url:http://www.us-cert.gov/legal.html>

Trust: 0.2

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://msdn.microsoft.com/en-us/library/bb776823(vs.85).aspx>

Trust: 0.1

url:http://www.f-secure.com/weblog/archives/00001576.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/889747>

Trust: 0.1

url:http://support.microsoft.com/kb/155217>

Trust: 0.1

url:http://www.cert.org/blogs/vuls/2008/04/the_dangers_of_windows_autorun.html>

Trust: 0.1

url:http://nick.brown.free.fr/blog/2007/10/memory-stick-worms>

Trust: 0.1

url:http://www.symantec.com/security_response/writeup.jsp?docid=2008-112203-2408-99>

Trust: 0.1

url:http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/91525.mspx>

Trust: 0.1

url:http://www.f-secure.com/weblog/archives/00001586.html>

Trust: 0.1

url:http://www.publicsafety.gc.ca/prg/em/ccirc/2008/tr08-004-eng.aspx>

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/29458/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/13223/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/889747

Trust: 0.1

url:http://secunia.com/advisories/33909/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.mcafee.com

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-020a.html),

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-088a.html>

Trust: 0.1

url:http://support.microsoft.com/kb/962007.

Trust: 0.1

url:http://support.microsoft.com/kb/958644>

Trust: 0.1

url:http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm>

Trust: 0.1

url:http://us.mcafee.com/root/campaign.asp?cid=54857>

Trust: 0.1

url:http://support.microsoft.com/kb/962007>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx>

Trust: 0.1

url:http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm

Trust: 0.1

sources: CERT/CC: VU#310355 // CERT/CC: VU#889747 // BID: 33739 // JVNDB: JVNDB-2009-001086 // PACKETSTORM: 74183 // PACKETSTORM: 64807 // PACKETSTORM: 74973 // PACKETSTORM: 76172 // CNNVD: CNNVD-200902-293 // NVD: CVE-2009-0216

CREDITS

Rayford Vaughn and Robert Wesley McGrew at Mississippi State University.

Trust: 0.3

sources: BID: 33739

SOURCES

db:IVDid:a6178710-23cc-11e6-abef-000c29c66e3d
db:CERT/CCid:VU#310355
db:CERT/CCid:VU#889747
db:BIDid:33739
db:JVNDBid:JVNDB-2009-001086
db:PACKETSTORMid:74183
db:PACKETSTORMid:64807
db:PACKETSTORMid:74973
db:PACKETSTORMid:76172
db:CNNVDid:CNNVD-200902-293
db:NVDid:CVE-2009-0216

LAST UPDATE DATE

2025-04-10T22:26:47.131000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#310355date:2009-02-24T00:00:00
db:CERT/CCid:VU#889747date:2009-04-14T00:00:00
db:BIDid:33739date:2009-02-12T00:18:00
db:JVNDBid:JVNDB-2009-001086date:2009-03-19T00:00:00
db:CNNVDid:CNNVD-200902-293date:2009-02-13T00:00:00
db:NVDid:CVE-2009-0216date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:IVDid:a6178710-23cc-11e6-abef-000c29c66e3ddate:2009-02-13T00:00:00
db:CERT/CCid:VU#310355date:2009-02-11T00:00:00
db:CERT/CCid:VU#889747date:2008-03-20T00:00:00
db:BIDid:33739date:2009-02-11T00:00:00
db:JVNDBid:JVNDB-2009-001086date:2009-03-19T00:00:00
db:PACKETSTORMid:74183date:2009-01-21T20:28:24
db:PACKETSTORMid:64807date:2008-03-21T23:24:01
db:PACKETSTORMid:74973date:2009-02-16T12:48:35
db:PACKETSTORMid:76172date:2009-03-30T19:50:26
db:CNNVDid:CNNVD-200902-293date:2009-02-13T00:00:00
db:NVDid:CVE-2009-0216date:2009-02-13T17:30:00.627