ID

VAR-200903-0332


CVE

CVE-2009-0801


TITLE

Intercepting proxy servers may incorrectly rely on HTTP headers to make connections

Trust: 0.8

sources: CERT/CC: VU#435052

DESCRIPTION

Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. HTTP of Host A transparent proxy server that relays the connection destination based on the header value may be exploited by an attacker. HTTP of Host Header is RFC 2616 Multiple web sites on a web server IP Used to enable address sharing. The transparent proxy server relays the network connection regardless of the browser settings. Some transparent proxy servers Host Some of them determine the connection destination based on the header value. Flash And Java Browser plug-ins such as these restrict communication by dynamic content executed on the browser to only the site or domain where the content was placed. Attackers use dynamic content, HTTP Host You can craft header values. The proxy server Host When making a decision based on the value of the header, the attacker Host By crafting the header, you can connect to any site. Attackers conduct attacks by directing users to sites with malicious dynamic content or by embedding malicious dynamic content in sites that they believe can be trusted. This issue only affects transparent proxy servers. In addition, browser Same Origin Policy Authentication information by attackers (cookie Such ) Reuse of is considered impossible.An attacker could access websites and resources that can be reached from the proxy. These sites may also include internal resources located on the intranet. Attackers may exploit this issue to obtain sensitive information such as internal intranet webpages. Additional attacks may also be possible. SOLUTION: As a workaround, the vendor recommends to "configure Guardian to block their internal web servers without passwords using hostname and IPaddress". - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Squid: Multiple vulnerabilities Date: September 27, 2013 Bugs: #261208, #389133, #447596, #452584, #461492, #476562, #476960 ID: 201309-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Squid, possibly resulting in remote Denial of Service. Background ========== Squid is a full-featured web proxy cache. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-proxy/squid < 3.2.13 >= 3.2.13 Description =========== Multiple vulnerabilities have been discovered in Squid. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker may be able to bypass ACL restrictions or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Squid users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-proxy/squid-3.2.13" References ========== [ 1 ] CVE-2009-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801 [ 2 ] CVE-2011-4096 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096 [ 3 ] CVE-2012-5643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643 [ 4 ] CVE-2013-0189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189 [ 5 ] CVE-2013-1839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839 [ 6 ] CVE-2013-4115 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115 [ 7 ] CVE-2013-4123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201309-22.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Ziproxy HTTP "Host:" Header Security Bypass SECUNIA ADVISORY ID: SA34018 VERIFY ADVISORY: http://secunia.com/advisories/34018/ DESCRIPTION: A security issue has been reported in Ziproxy, which can be exploited by malicious people to bypass certain security restrictions. This can be exploited to e.g. access restricted websites or bypass a browser's security context protection mechanism by sending HTTP requests with a forged HTTP "Host:" header. via active content). The security issue is reported in version 2.6.0. Other versions may also be affected. SOLUTION: The vendor recommends to use a proxy server with better security capabilities between clients and Ziproxy. Use a firewall to restrict access to untrusted websites. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Robert Auger, PayPal Information Risk Management team. ORIGINAL ADVISORY: US-CERT VU#435052: http://www.kb.cert.org/vuls/id/435052 http://www.kb.cert.org/vuls/id/MAPG-7N9GN8 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . SOLUTION: The vendor has published workarounds

Trust: 3.24

sources: NVD: CVE-2009-0801 // CERT/CC: VU#435052 // JVNDB: JVNDB-2009-001094 // BID: 33858 // VULMON: CVE-2009-0801 // PACKETSTORM: 75119 // PACKETSTORM: 123423 // PACKETSTORM: 75100 // PACKETSTORM: 75126 // PACKETSTORM: 75099 // PACKETSTORM: 75373

AFFECTED PRODUCTS

vendor:squidmodel:web proxy cachescope:eqversion:2.7

Trust: 1.9

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable2

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:2.7.stable5

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable1

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable5

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable3

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable13

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable12

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:2.7.stable6

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable4

Trust: 1.6

vendor:squidmodel:web proxy cachescope:eqversion:3.0

Trust: 1.3

vendor:squidmodel:web proxy cachescope:eqversion:3.0_pre3

Trust: 1.0

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable6

Trust: 1.0

vendor:squidmodel:web proxy cachescope:eqversion:3.0_pre2

Trust: 1.0

vendor:squidmodel:web proxy cachescope:eqversion:3.0_stable7

Trust: 1.0

vendor:squidmodel:web proxy cachescope:eqversion:3.0_pre1

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:astaromodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:internet initiativemodel: - scope: - version: -

Trust: 0.8

vendor:qbik new zealandmodel: - scope: - version: -

Trust: 0.8

vendor:smoothwallmodel: - scope: - version: -

Trust: 0.8

vendor:squidmodel: - scope: - version: -

Trust: 0.8

vendor:ziproxymodel: - scope: - version: -

Trust: 0.8

vendor:squid cachemodel:squidscope:eqversion:1.x to 3.1

Trust: 0.8

vendor:squid cachemodel:squidscope:eqversion:3.2 to 3.2.0.10

Trust: 0.8

vendor:internet initiativemodel:seil/b1scope:eqversion:1.00 ~ 2.20

Trust: 0.8

vendor:internet initiativemodel:seil/plusscope:eqversion:1.83 ~ 2.00

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:1.83 ~ 2.00

Trust: 0.8

vendor:internet initiativemodel:seil/x1,x2scope:eqversion:1.00 ~ 2.20

Trust: 0.8

vendor:ziproxymodel:ziproxyscope:eqversion:2.6

Trust: 0.3

vendor:themodel:mac orchard dansguardianscope:eqversion:0

Trust: 0.3

vendor:squidmodel:web proxy cache pre3scope:eqversion:3.0

Trust: 0.3

vendor:squidmodel:web proxy cache pre2scope:eqversion:3.0

Trust: 0.3

vendor:squidmodel:web proxy cache pre1scope:eqversion:3.0

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable7scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable6scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable5scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable4scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable3scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable2scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable13scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable12scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 3.0.stable1scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 2.7.stable6scope: - version: -

Trust: 0.3

vendor:squidmodel:web proxy cache 2.7.stable5scope: - version: -

Trust: 0.3

vendor:smoothwallmodel:smoothguardianscope:eqversion:2008

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.5.2

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.2.2

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.2.1

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.1.4.1099

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.1.3.1096

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.1.2.1094

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.1.1.1077

Trust: 0.3

vendor:qbikmodel:wingate buildscope:eqversion:6.0.31005

Trust: 0.3

vendor:qbikmodel:wingate buildscope:eqversion:6.0.21001

Trust: 0.3

vendor:qbikmodel:wingate buildscope:eqversion:6.0.21000

Trust: 0.3

vendor:qbikmodel:wingate buildscope:eqversion:6.0.1995

Trust: 0.3

vendor:qbikmodel:wingate buildscope:eqversion:6.0.1993

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.0.0

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.2

Trust: 0.3

vendor:qbikmodel:wingatescope:eqversion:6.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:funkwerkmodel:utmscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:0

Trust: 0.3

vendor:bloxxmodel:bloxxscope:eqversion:0

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.404

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.402

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.302

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.301

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.3

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.006

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7.005

Trust: 0.3

vendor:astaromodel:security gatewayscope:eqversion:7

Trust: 0.3

vendor:ziproxymodel:ziproxyscope:neversion:2.7

Trust: 0.3

vendor:themodel:mac orchard dansguardianscope:neversion:2.10.1.1

Trust: 0.3

vendor:funkwerkmodel:utmscope:neversion:1.95.1

Trust: 0.3

sources: CERT/CC: VU#435052 // BID: 33858 // JVNDB: JVNDB-2009-001094 // CNNVD: CNNVD-200903-067 // NVD: CVE-2009-0801

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0801
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#435052
value: 3.54

Trust: 0.8

NVD: CVE-2009-0801
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200903-067
value: MEDIUM

Trust: 0.6

VULMON: CVE-2009-0801
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-0801
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: CERT/CC: VU#435052 // VULMON: CVE-2009-0801 // JVNDB: JVNDB-2009-001094 // CNNVD: CNNVD-200903-067 // NVD: CVE-2009-0801

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2009-001094 // NVD: CVE-2009-0801

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 123423 // CNNVD: CNNVD-200903-067

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200903-067

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001094

PATCH

title:透過型HTTPプロキシサーバにおけるハンドオフ機能の脆弱性url:http://www.seil.jp/seilseries/security/2009/04091698.php

Trust: 0.8

title:SQUID-2011:1url:http://www.squid-cache.org/Advisories/SQUID-2011_1.txt

Trust: 0.8

title:3.2.0.11url:http://www.squid-cache.org/Versions/v3/3.2/RELEASENOTES.html

Trust: 0.8

title:3.1.15url:http://www.squid-cache.org/Versions/v3/3.1/RELEASENOTES.html#ss1.1

Trust: 0.8

title:Top Pageurl:http://www.squid-cache.org/

Trust: 0.8

title:Debian CVElist Bug Report Logs: CVE-2009-0801: HTTP Host Header Incorrect Relay Behavior Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f9283cbfd0cedb791a3109b7b4a06782

Trust: 0.1

title: - url:https://github.com/newtonjp/redsocks

Trust: 0.1

title:redsocks_for_mipselurl:https://github.com/SuzukiHonoka/redsocks_for_mipsel

Trust: 0.1

title:squid-in-a-canurl:https://github.com/jpetazzo/squid-in-a-can

Trust: 0.1

title:docker-squidurl:https://github.com/pires/docker-squid

Trust: 0.1

title:redsocksurl:https://github.com/darkk/redsocks

Trust: 0.1

sources: VULMON: CVE-2009-0801 // JVNDB: JVNDB-2009-001094

EXTERNAL IDS

db:CERT/CCid:VU#435052

Trust: 4.1

db:NVDid:CVE-2009-0801

Trust: 2.9

db:BIDid:33858

Trust: 2.8

db:SECUNIAid:34019

Trust: 1.0

db:VUPENid:ADV-2009-0500

Trust: 0.8

db:JVNDBid:JVNDB-2009-001094

Trust: 0.8

db:CNNVDid:CNNVD-200903-067

Trust: 0.6

db:SECUNIAid:34014

Trust: 0.2

db:SECUNIAid:34020

Trust: 0.2

db:SECUNIAid:34018

Trust: 0.2

db:SECUNIAid:34064

Trust: 0.2

db:VULMONid:CVE-2009-0801

Trust: 0.1

db:PACKETSTORMid:75119

Trust: 0.1

db:PACKETSTORMid:123423

Trust: 0.1

db:PACKETSTORMid:75100

Trust: 0.1

db:PACKETSTORMid:75126

Trust: 0.1

db:PACKETSTORMid:75099

Trust: 0.1

db:PACKETSTORMid:75373

Trust: 0.1

sources: CERT/CC: VU#435052 // VULMON: CVE-2009-0801 // BID: 33858 // JVNDB: JVNDB-2009-001094 // PACKETSTORM: 75119 // PACKETSTORM: 123423 // PACKETSTORM: 75100 // PACKETSTORM: 75126 // PACKETSTORM: 75099 // PACKETSTORM: 75373 // CNNVD: CNNVD-200903-067 // NVD: CVE-2009-0801

REFERENCES

url:http://www.kb.cert.org/vuls/id/435052

Trust: 3.3

url:http://www.securityfocus.com/bid/33858

Trust: 2.5

url:http://secunia.com/advisories/34019/

Trust: 0.9

url:http://www.thesecuritypractice.com/the_security_practice/transparentproxyabuse.pdf

Trust: 0.8

url:http://www.ietf.org/rfc/rfc2616.txt

Trust: 0.8

url:http://www.webappsec.org/lists/websecurity/archive/2008-06/msg00073.html

Trust: 0.8

url:http://www.us-cert.gov/reading_room/securing_browser/

Trust: 0.8

url:http://kb.adobe.com/selfservice/viewcontent.do?externalid=tn_14213

Trust: 0.8

url:http://www.w3.org/protocols/rfc2616/rfc2616-sec9.html

Trust: 0.8

url:http://www.owasp.org/index.php/testing_for_http_methods_and_xst_(owasp-cm-008)#black_box_testing_and_example

Trust: 0.8

url:http://en.wikipedia.org/w/index.php?title=list_of_tcp_and_udp_port_numbers&oldid=266934839

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0801

Trust: 0.8

url:http://jvn.jp/cert/jvnvu435052/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0801

Trust: 0.8

url:http://www.vupen.com/english/advisories/2009/0500

Trust: 0.8

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.5

url:http://secunia.com/advisories/business_solutions/

Trust: 0.5

url:http://secunia.com/advisories/try_vi/

Trust: 0.5

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.5

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.5

url:https://hypersonic.bluecoat.com/support/securityadvisories/proxysg_in_transparent_deployments

Trust: 0.4

url:http://www.cgisecurity.com/2009/07/more-products-identified-using-vulnerable-transparent-proxy-architecture.html

Trust: 0.3

url:http://www.smoothwall.net/products/smoothguardian2008/

Trust: 0.3

url:http://www.thesecuritypractice.com/the_security_practice/2009/03/socket-capable-browser-plugins-result-in-transparent-proxy-abuse.html

Trust: 0.3

url:http://www.squid-cache.org/

Trust: 0.3

url:http://www.wingate.com/

Trust: 0.3

url:http://ziproxy.sourceforge.net/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://github.com/newtonjp/redsocks

Trust: 0.1

url:https://github.com/suzukihonoka/redsocks_for_mipsel

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=45097

Trust: 0.1

url:http://secunia.com/advisories/34014/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/mapg-7m6sm7

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1839

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0189

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4115

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4096

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5643

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201309-22.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1839

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0801

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4115

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4096

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5643

Trust: 0.1

url:http://secunia.com/advisories/34020/

Trust: 0.1

url:http://secunia.com/advisories/34018/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/mapg-7n9gn8

Trust: 0.1

url:http://secunia.com/advisories/34064/

Trust: 0.1

sources: CERT/CC: VU#435052 // VULMON: CVE-2009-0801 // BID: 33858 // JVNDB: JVNDB-2009-001094 // PACKETSTORM: 75119 // PACKETSTORM: 123423 // PACKETSTORM: 75100 // PACKETSTORM: 75126 // PACKETSTORM: 75099 // PACKETSTORM: 75373 // CNNVD: CNNVD-200903-067 // NVD: CVE-2009-0801

CREDITS

Robert Auger from the PayPal Information Risk Management team

Trust: 0.9

sources: BID: 33858 // CNNVD: CNNVD-200903-067

SOURCES

db:CERT/CCid:VU#435052
db:VULMONid:CVE-2009-0801
db:BIDid:33858
db:JVNDBid:JVNDB-2009-001094
db:PACKETSTORMid:75119
db:PACKETSTORMid:123423
db:PACKETSTORMid:75100
db:PACKETSTORMid:75126
db:PACKETSTORMid:75099
db:PACKETSTORMid:75373
db:CNNVDid:CNNVD-200903-067
db:NVDid:CVE-2009-0801

LAST UPDATE DATE

2025-04-10T21:36:40.577000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#435052date:2009-09-28T00:00:00
db:VULMONid:CVE-2009-0801date:2009-06-18T00:00:00
db:BIDid:33858date:2013-09-28T00:16:00
db:JVNDBid:JVNDB-2009-001094date:2011-09-14T00:00:00
db:CNNVDid:CNNVD-200903-067date:2009-06-18T00:00:00
db:NVDid:CVE-2009-0801date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#435052date:2009-02-23T00:00:00
db:VULMONid:CVE-2009-0801date:2009-03-04T00:00:00
db:BIDid:33858date:2009-02-23T00:00:00
db:JVNDBid:JVNDB-2009-001094date:2009-03-25T00:00:00
db:PACKETSTORMid:75119date:2009-02-23T14:11:04
db:PACKETSTORMid:123423date:2013-09-27T22:24:58
db:PACKETSTORMid:75100date:2009-02-23T12:27:14
db:PACKETSTORMid:75126date:2009-02-24T15:54:02
db:PACKETSTORMid:75099date:2009-02-23T12:27:11
db:PACKETSTORMid:75373date:2009-03-04T15:05:53
db:CNNVDid:CNNVD-200903-067date:2009-03-04T00:00:00
db:NVDid:CVE-2009-0801date:2009-03-04T16:30:00.170