ID

VAR-200905-0505


CVE

CVE-2009-0945


TITLE

WebKit In SVGPathList Vulnerability in arbitrary code execution related to processing of documents with data structures

Trust: 0.8

sources: JVNDB: JVNDB-2009-001336

DESCRIPTION

Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption. WebKit of insertItemBefore Methods include SVGPathList A vulnerability exists in the execution of arbitrary code due to flaws in the processing of documents with data structures.A third party may execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The specific flaw exists during the parsing of malformed SVGLists via the SVGPathList data structure, the following lists are affected: SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList, SVGLengthList. When a negative index argument is suppled to the insertItemBefore() method, a memory corruption occurs resulting in the ability to execute arbitrary code. WebKit is prone to a remote memory-corruption vulnerability. Failed exploit attempts will result in a denial-of-service condition. The issue also affects the following: Apple Safari prior to 3.2.3 Apple Mac OS X v10.5 through v10.5.6, Apple Mac OS X Server v10.5 through v10.5.6 Google Chrome prior to 1.0.154.65. Safari is the web browser bundled by default in the Apple operating system. There is a memory corruption vulnerability in the processing of SVGList objects in WebKit in Safari. Safari has multiple input validation errors in its handling of the feed: URL, and accessing a malicious feed: URL can lead to arbitrary JavaScript execution. (CVE-2009-1687). (CVE-2009-1690). (CVE-2009-0689). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1687 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1690 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2537 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.1: c08161eacba6cdb1b0ba26babe5f8cc5 2009.1/i586/kdelibs4-core-4.2.4-0.8mdv2009.1.i586.rpm 933468cf4109252dac5119edd958f73d 2009.1/i586/kdelibs4-devel-4.2.4-0.8mdv2009.1.i586.rpm 96703a0ef0baf299647ff27d64cb0680 2009.1/i586/libkde3support4-4.2.4-0.8mdv2009.1.i586.rpm e5f60ba41e5919fa77c313b204e1f712 2009.1/i586/libkdecore5-4.2.4-0.8mdv2009.1.i586.rpm cf8af6e467cd1585c44e1cce01362526 2009.1/i586/libkdefakes5-4.2.4-0.8mdv2009.1.i586.rpm 1c9c04b5f6c0c59d2e5860b077e0c6e3 2009.1/i586/libkdesu5-4.2.4-0.8mdv2009.1.i586.rpm 89fe7c33c7e5bcc23595560ae4664bf6 2009.1/i586/libkdeui5-4.2.4-0.8mdv2009.1.i586.rpm 30b73ef58ac3a45ff86756ad09d0d555 2009.1/i586/libkdnssd4-4.2.4-0.8mdv2009.1.i586.rpm a1f00af00ea7e52d9f187f1fe5ccdfe2 2009.1/i586/libkfile4-4.2.4-0.8mdv2009.1.i586.rpm 553486988b945307ee038cb41dcb76e6 2009.1/i586/libkhtml5-4.2.4-0.8mdv2009.1.i586.rpm 9d9501ff70e709c5ea32b35aa985688a 2009.1/i586/libkimproxy4-4.2.4-0.8mdv2009.1.i586.rpm a2ec3f440eb6cf545abbc63a3d34c1e5 2009.1/i586/libkio5-4.2.4-0.8mdv2009.1.i586.rpm 4168e955b60a5a69d8f1e085b30d0424 2009.1/i586/libkjs4-4.2.4-0.8mdv2009.1.i586.rpm bfcece9c73348c6415c48ec266877908 2009.1/i586/libkjsapi4-4.2.4-0.8mdv2009.1.i586.rpm 228ca7dc2a86fdc868a5937b16a7a08c 2009.1/i586/libkjsembed4-4.2.4-0.8mdv2009.1.i586.rpm f6297ae0630eb6207895df9f2f971eb6 2009.1/i586/libkmediaplayer4-4.2.4-0.8mdv2009.1.i586.rpm cf6113c17858d5e6e3c0e04622f8a66c 2009.1/i586/libknewstuff2_4-4.2.4-0.8mdv2009.1.i586.rpm da55a2f428ad020834f7b91c0023ecf6 2009.1/i586/libknotifyconfig4-4.2.4-0.8mdv2009.1.i586.rpm 9fef466138ff78a3d6d3244998a9ba30 2009.1/i586/libkntlm4-4.2.4-0.8mdv2009.1.i586.rpm 4f7c0ad254ec1990f5dab1c0b959629d 2009.1/i586/libkparts4-4.2.4-0.8mdv2009.1.i586.rpm 8c58d6a9a6ec7fc21f287b2f4c2e9858 2009.1/i586/libkpty4-4.2.4-0.8mdv2009.1.i586.rpm 8ed500d050b95560d7eff6db26fa05ee 2009.1/i586/libkrosscore4-4.2.4-0.8mdv2009.1.i586.rpm 2d8d12d8a7bbfe18f6b04b9807795077 2009.1/i586/libkrossui4-4.2.4-0.8mdv2009.1.i586.rpm 8cc5c226e381b122983440b3440c1476 2009.1/i586/libktexteditor4-4.2.4-0.8mdv2009.1.i586.rpm 3c53941130fb8cc6d12b8cdea488f536 2009.1/i586/libkunittest4-4.2.4-0.8mdv2009.1.i586.rpm 3996bfcff0b2465c39c6ccdb8367f401 2009.1/i586/libkutils4-4.2.4-0.8mdv2009.1.i586.rpm 129a26ab20c792994113b5db00b7f7c4 2009.1/i586/libnepomuk4-4.2.4-0.8mdv2009.1.i586.rpm 0b88090e1cba0db59a3fb85c34e6b726 2009.1/i586/libplasma3-4.2.4-0.8mdv2009.1.i586.rpm 79b484a6c8e20db156fbe130c81e2001 2009.1/i586/libsolid4-4.2.4-0.8mdv2009.1.i586.rpm ddd09e03af15f421b2e38b6f06c0247a 2009.1/i586/libthreadweaver4-4.2.4-0.8mdv2009.1.i586.rpm fe70dc01416cc986d1e19c15a0b5cfa7 2009.1/SRPMS/kdelibs4-4.2.4-0.8mdv2009.1.src.rpm Mandriva Linux 2009.1/X86_64: 89f77418ccda86b51c7d32d011e88e9b 2009.1/x86_64/kdelibs4-core-4.2.4-0.8mdv2009.1.x86_64.rpm d0b009e595350648b12cca1ee094802e 2009.1/x86_64/kdelibs4-devel-4.2.4-0.8mdv2009.1.x86_64.rpm 03db494c356e0b0823ddf697d42c0f50 2009.1/x86_64/lib64kde3support4-4.2.4-0.8mdv2009.1.x86_64.rpm 6d98531ba95a096fd49801f7df452776 2009.1/x86_64/lib64kdecore5-4.2.4-0.8mdv2009.1.x86_64.rpm bf3845f586eeeaafab5e25442f4d8950 2009.1/x86_64/lib64kdefakes5-4.2.4-0.8mdv2009.1.x86_64.rpm b9767fb69262886d60a7844ad6569e27 2009.1/x86_64/lib64kdesu5-4.2.4-0.8mdv2009.1.x86_64.rpm d709c9fb8874c432d1b4e415e9c06858 2009.1/x86_64/lib64kdeui5-4.2.4-0.8mdv2009.1.x86_64.rpm 6d062780a7629eed7e93ab9e66daf633 2009.1/x86_64/lib64kdnssd4-4.2.4-0.8mdv2009.1.x86_64.rpm f39c44bc7572d06921061c0ac5ef78c9 2009.1/x86_64/lib64kfile4-4.2.4-0.8mdv2009.1.x86_64.rpm 90f8ecd4967830ebff3b81732162fe33 2009.1/x86_64/lib64khtml5-4.2.4-0.8mdv2009.1.x86_64.rpm 005d7de69a0063a8dc396b9dffdf20ed 2009.1/x86_64/lib64kimproxy4-4.2.4-0.8mdv2009.1.x86_64.rpm 3924d83bf43990f7a7ba5d2eea29ef5d 2009.1/x86_64/lib64kio5-4.2.4-0.8mdv2009.1.x86_64.rpm 9124f0ce5f1643e4310ef0bfc5fda970 2009.1/x86_64/lib64kjs4-4.2.4-0.8mdv2009.1.x86_64.rpm 573504d0c305e757b3c163b9132264e4 2009.1/x86_64/lib64kjsapi4-4.2.4-0.8mdv2009.1.x86_64.rpm 917e5b175a3a5480e848dee6201e99d9 2009.1/x86_64/lib64kjsembed4-4.2.4-0.8mdv2009.1.x86_64.rpm 604cce29c11b2452b2744ff72e248b7c 2009.1/x86_64/lib64kmediaplayer4-4.2.4-0.8mdv2009.1.x86_64.rpm bd75d3e4feaa98a3659ae5d113fe45f6 2009.1/x86_64/lib64knewstuff2_4-4.2.4-0.8mdv2009.1.x86_64.rpm 0a7d48b91c673f5908ce2d47a77746e2 2009.1/x86_64/lib64knotifyconfig4-4.2.4-0.8mdv2009.1.x86_64.rpm a91967cfec8b470cc7520ac17590d41b 2009.1/x86_64/lib64kntlm4-4.2.4-0.8mdv2009.1.x86_64.rpm 0159bb033c507f20fb8bd77a7a8be43a 2009.1/x86_64/lib64kparts4-4.2.4-0.8mdv2009.1.x86_64.rpm a062d0124cdea9dfcafb82ed2c5dfd54 2009.1/x86_64/lib64kpty4-4.2.4-0.8mdv2009.1.x86_64.rpm 8c0950479a23531a03836f7744d6b90d 2009.1/x86_64/lib64krosscore4-4.2.4-0.8mdv2009.1.x86_64.rpm ca61efacf989bd4421d2c88abc440e3f 2009.1/x86_64/lib64krossui4-4.2.4-0.8mdv2009.1.x86_64.rpm bcd31e87995de0f86ad9c363e87ea0d4 2009.1/x86_64/lib64ktexteditor4-4.2.4-0.8mdv2009.1.x86_64.rpm 23a0f2c640a20dd1be2b4475a9102cd6 2009.1/x86_64/lib64kunittest4-4.2.4-0.8mdv2009.1.x86_64.rpm e49987a6d8016b6ac39011b6cac0b570 2009.1/x86_64/lib64kutils4-4.2.4-0.8mdv2009.1.x86_64.rpm 90d6806fa9dcd2ac1b71fc3b72dd4f81 2009.1/x86_64/lib64nepomuk4-4.2.4-0.8mdv2009.1.x86_64.rpm 4808080c578223d0bcb156e78f5d661f 2009.1/x86_64/lib64plasma3-4.2.4-0.8mdv2009.1.x86_64.rpm e8cecb137634dfc738617b67a6d34122 2009.1/x86_64/lib64solid4-4.2.4-0.8mdv2009.1.x86_64.rpm 35c8778eaaa5465a8f15c27a57d8ed60 2009.1/x86_64/lib64threadweaver4-4.2.4-0.8mdv2009.1.x86_64.rpm fe70dc01416cc986d1e19c15a0b5cfa7 2009.1/SRPMS/kdelibs4-4.2.4-0.8mdv2009.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-022 May 13, 2009 -- CVE ID: CVE-2009-0945 -- Affected Vendors: Apple -- Affected Products: Apple Safari -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 6960. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT3549 -- Disclosure Timeline: 2009-03-19 - Vulnerability reported to vendor 2009-05-13 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Nils -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ . =========================================================== Ubuntu Security Notice USN-836-1 September 23, 2009 webkit vulnerabilities CVE-2009-0945, CVE-2009-1687, CVE-2009-1690, CVE-2009-1698, CVE-2009-1711, CVE-2009-1712, CVE-2009-1725 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.10 Ubuntu 9.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.10: libwebkit-1.0-1 1.0.1-2ubuntu0.2 libwebkit-1.0-1-dbg 1.0.1-2ubuntu0.2 libwebkit-dev 1.0.1-2ubuntu0.2 Ubuntu 9.04: libwebkit-1.0-1 1.0.1-4ubuntu0.1 libwebkit-1.0-1-dbg 1.0.1-4ubuntu0.1 libwebkit-dev 1.0.1-4ubuntu0.1 After a standard system upgrade you need to restart any applications that use WebKit, such as Epiphany-webkit and Midori, to effect the necessary changes. Details follow: It was discovered that WebKit did not properly handle certain SVGPathList data structures. (CVE-2009-0945) Several flaws were discovered in the WebKit browser and JavaScript engines. (CVE-2009-1687, CVE-2009-1690, CVE-2009-1698, CVE-2009-1711, CVE-2009-1725) It was discovered that WebKit did not prevent the loading of local Java applets. (CVE-2009-1712) Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.diff.gz Size/MD5: 25401 ca58f621eec09ea60847fb7eeb18ef2a http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.dsc Size/MD5: 1538 ebdb32117beca5fff473ca0c1b065b42 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1.orig.tar.gz Size/MD5: 13418752 4de68a5773998bea14e8939aa341c466 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-2ubuntu0.2_all.deb Size/MD5: 34590 acb9cdfb9608c5f4146ea88eef384e75 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_amd64.deb Size/MD5: 62592212 df3152f6a40e538e3a267908d83783c0 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_amd64.deb Size/MD5: 3501472 e68f67894e53eb2faa48191ea3953732 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_i386.deb Size/MD5: 62206938 b7d1dde62360865cbc814122b93d4005 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_i386.deb Size/MD5: 3014500 73a5a3e9985f6d165120c5c3cca6d06b lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_lpia.deb Size/MD5: 62284322 75ff8aefee1fdea994f660dab5f6554f http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_lpia.deb Size/MD5: 2966170 1c52f1920282c659a0a81a3be44dde7f Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.diff.gz Size/MD5: 30900 0ea9f48f994b9bd759446a939ff5dca3 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.dsc Size/MD5: 1538 31502504b765f1161825ccdb82f71788 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1.orig.tar.gz Size/MD5: 13418752 4de68a5773998bea14e8939aa341c466 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-4ubuntu0.1_all.deb Size/MD5: 34678 5042c01c01e9d128a13d1457c56b0cbd amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_amd64.deb Size/MD5: 62772554 3026ef7b332447cae68ed4f72b35ddb2 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_amd64.deb Size/MD5: 3502830 0fcd75b07524e2d70f8770ccd5bdc0c3 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_i386.deb Size/MD5: 62357024 777eb37c5384472cf9b4adac21f0d116 http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_i386.deb Size/MD5: 3014688 100fd9406ea649edd954f4d154ab4d30 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_lpia.deb Size/MD5: 62441454 18aa72b5c443a86153906e5ba4a87e55 http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_lpia.deb Size/MD5: 2968040 9651199f95dfee6252e2aacde99ebbbf . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1950 security@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 12, 2009 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : webkit Vulnerability : several Problem type : remote (local) Debian-specific: no CVE Id : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698 CVE-2009-1711 CVE-2009-1712 CVE-2009-1725 CVE-2009-1714 CVE-2009-1710 CVE-2009-1697 CVE-2009-1695 CVE-2009-1693 CVE-2009-1694 CVE-2009-1681 CVE-2009-1684 CVE-2009-1692 Debian Bug : 532724 532725 534946 535793 538346 Several vulnerabilities have been discovered in webkit, a Web content engine library for Gtk+. CVE-2009-1711 WebKit does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document. CVE-2009-1725 WebKit do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. CVE-2009-1714 Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit allows user-assisted remote attackers to inject arbitrary web script or HTML, and read local files, via vectors related to the improper escaping of HTML attributes. CVE-2009-1710 WebKit allows remote attackers to spoof the browser's display of the host name, security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property. CVE-2009-1697 CRLF injection vulnerability in WebKit allows remote attackers to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML document, related to cross-site scripting (XSS) attacks that depend on communication with arbitrary web sites on the same server through use of XMLHttpRequest without a Host header. CVE-2009-1695 Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition. CVE-2009-1693 WebKit allows remote attackers to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site image capture issue." CVE-2009-1694 WebKit does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a "cross-site image capture issue." CVE-2009-1681 WebKit does not prevent web sites from loading third-party content into a subframe, which allows remote attackers to bypass the Same Origin Policy and conduct "clickjacking" attacks via a crafted HTML document. CVE-2009-1684 Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via an event handler that triggers script execution in the context of the next loaded document. CVE-2009-1692 WebKit allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object. For the stable distribution (lenny), these problems has been fixed in version 1.0.1-4+lenny2. For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1.1.16-1. We recommend that you upgrade your webkit package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1.orig.tar.gz Size/MD5 checksum: 13418752 4de68a5773998bea14e8939aa341c466 http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.diff.gz Size/MD5 checksum: 35369 506c8f2fef73a9fc856264f11a3ad27e http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.dsc Size/MD5 checksum: 1447 b5f01d6428f01d79bfe18338064452ab Architecture independent packages: http://security.debian.org/pool/updates/main/w/webkit/libwebkit-dev_1.0.1-4+lenny2_all.deb Size/MD5 checksum: 35164 df682bbcd13389c2f50002c2aaf7347b alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_alpha.deb Size/MD5 checksum: 65193740 fc8b613c9c41ef0f0d3856e7ee3deeae http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_alpha.deb Size/MD5 checksum: 4254938 252b95b962bda11c000f9c0543673c1b amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_amd64.deb Size/MD5 checksum: 3502994 4a96cad1e302e7303d41d6f866215da4 http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_amd64.deb Size/MD5 checksum: 62518476 d723a8c76b373026752b6f68e5fc4950 arm architecture (ARM) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_arm.deb Size/MD5 checksum: 2721324 1fac2f59ffa9e3d7b8697aae262f09e4 http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_arm.deb Size/MD5 checksum: 61478724 260faea7d5ba766268faad888b3e61ff armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_armel.deb Size/MD5 checksum: 2770654 5b88754e9804d9290537afdf6127643a http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_armel.deb Size/MD5 checksum: 59892062 99c8f13257a054f42686ab9c6329d490 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_hppa.deb Size/MD5 checksum: 3869020 c61be734b6511788e8cc235a5d672eab http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_hppa.deb Size/MD5 checksum: 63935342 f1db2bd7b5c22e257c74100798017f30 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_i386.deb Size/MD5 checksum: 62161744 f89fc6ac6d1110cabe47dd9184c9a9ca http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_i386.deb Size/MD5 checksum: 3016584 b854f5294527adac80e9776efed37cd7 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_ia64.deb Size/MD5 checksum: 5547624 2bd2100a345089282117317a9ab2e7d1 http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_ia64.deb Size/MD5 checksum: 62685224 5eaff5d431cf4a85beeaa0b66c91958c mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mips.deb Size/MD5 checksum: 3109134 a680a8f105a19bf1b21a5034c14c4822 http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mips.deb Size/MD5 checksum: 64547832 dd440891a1861262bc92deb0a1ead013 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mipsel.deb Size/MD5 checksum: 2992848 952d643be475c35e253a8757075cd41b http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mipsel.deb Size/MD5 checksum: 62135970 7cd635047e3f9bd000ff4547a47eaaec s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_s390.deb Size/MD5 checksum: 3456914 6fc856a50b3f899c36381ed8d51af44e http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_s390.deb Size/MD5 checksum: 64385860 98ded86952a2c6714ceba76a4a98c35b sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_sparc.deb Size/MD5 checksum: 63621854 f0dd17453bc09fdc05c119faf2212d70 http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_sparc.deb Size/MD5 checksum: 3499170 3f2084d6416459ce1416bd6f6f2845e3 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAksjbAYACgkQNxpp46476aqm7wCaAk6WARfBzzrdYYoxAUKA5weL V5YAmwRkz4XNwdcqnPzdeDzoakljqf1s =DBEQ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.15

sources: NVD: CVE-2009-0945 // JVNDB: JVNDB-2009-001336 // ZDI: ZDI-09-022 // BID: 34924 // VULHUB: VHN-38391 // PACKETSTORM: 80577 // PACKETSTORM: 85920 // PACKETSTORM: 85663 // PACKETSTORM: 77670 // PACKETSTORM: 81589 // PACKETSTORM: 83759

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:0.9

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:0.8

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:lteversion:3.2.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5 to v10.5.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5 to v10.5.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:iosscope:eqversion:1.0 to 2.2.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 2.2.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:3.2.3

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4 public beta

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel optional productivity applicationsscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel optional productivity applications eusscope:eqversion:5.3.z (server)

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.7

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:trolltechmodel:qtscope:eqversion:4.4.3

Trust: 0.3

vendor:trolltechmodel:qtscope:eqversion:4.5

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:kdegraphicsscope:eqversion:3.5.4

Trust: 0.3

vendor:kdemodel:kdescope:eqversion:4.2.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:googlemodel:chromescope:neversion:1.0.154.65

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:neversion:3.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.7

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.3

sources: ZDI: ZDI-09-022 // BID: 34924 // JVNDB: JVNDB-2009-001336 // NVD: CVE-2009-0945

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0945
value: HIGH

Trust: 1.0

NVD: CVE-2009-0945
value: HIGH

Trust: 0.8

VULHUB: VHN-38391
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0945
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38391
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38391 // JVNDB: JVNDB-2009-001336 // NVD: CVE-2009-0945

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-38391 // JVNDB: JVNDB-2009-001336 // NVD: CVE-2009-0945

THREAT TYPE

network

Trust: 0.3

sources: BID: 34924

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 34924

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001336

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-38391

PATCH

title:HT3549url:http://support.apple.com/kb/HT3549

Trust: 1.5

title:HT3550url:http://support.apple.com/kb/HT3550

Trust: 0.8

title:HT3551url:http://support.apple.com/kb/HT3551

Trust: 0.8

title:HT3639url:http://support.apple.com/kb/HT3639

Trust: 0.8

title:HT3550url:http://support.apple.com/kb/HT3550?viewlocale=ja_JP

Trust: 0.8

title:HT3639url:http://support.apple.com/kb/HT3639?viewlocale=ja_JP

Trust: 0.8

title:HT3549url:http://support.apple.com/kb/HT3549?viewlocale=ja_JP

Trust: 0.8

title:RHSA-2009:1130url:https://rhn.redhat.com/errata/RHSA-2009-1130.html

Trust: 0.8

title:RHSA-2009:1130url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1130J.html

Trust: 0.8

title:TA09-133Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta09-133a.html

Trust: 0.8

sources: ZDI: ZDI-09-022 // JVNDB: JVNDB-2009-001336

EXTERNAL IDS

db:NVDid:CVE-2009-0945

Trust: 3.5

db:ZDIid:ZDI-09-022

Trust: 2.2

db:BIDid:34924

Trust: 2.2

db:VUPENid:ADV-2009-1297

Trust: 1.9

db:VUPENid:ADV-2009-1298

Trust: 1.9

db:SECUNIAid:35074

Trust: 1.9

db:SECUNIAid:35056

Trust: 1.9

db:USCERTid:TA09-133A

Trust: 1.9

db:SECTRACKid:1022207

Trust: 1.9

db:VUPENid:ADV-2009-1321

Trust: 1.1

db:VUPENid:ADV-2009-1621

Trust: 1.1

db:VUPENid:ADV-2011-0212

Trust: 1.1

db:SECUNIAid:37746

Trust: 1.1

db:SECUNIAid:35576

Trust: 1.1

db:SECUNIAid:36790

Trust: 1.1

db:SECUNIAid:35805

Trust: 1.1

db:SECUNIAid:35095

Trust: 1.1

db:SECUNIAid:36062

Trust: 1.1

db:SECUNIAid:36461

Trust: 1.1

db:SECUNIAid:43068

Trust: 1.1

db:XFid:50477

Trust: 0.8

db:USCERTid:SA09-133A

Trust: 0.8

db:JVNDBid:JVNDB-2009-001336

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-464

Trust: 0.7

db:PACKETSTORMid:81589

Trust: 0.2

db:PACKETSTORMid:80577

Trust: 0.2

db:PACKETSTORMid:83759

Trust: 0.2

db:PACKETSTORMid:85920

Trust: 0.2

db:PACKETSTORMid:77670

Trust: 0.2

db:PACKETSTORMid:80565

Trust: 0.1

db:PACKETSTORMid:82662

Trust: 0.1

db:VULHUBid:VHN-38391

Trust: 0.1

db:PACKETSTORMid:85663

Trust: 0.1

sources: ZDI: ZDI-09-022 // VULHUB: VHN-38391 // BID: 34924 // PACKETSTORM: 80577 // PACKETSTORM: 85920 // PACKETSTORM: 85663 // PACKETSTORM: 77670 // PACKETSTORM: 81589 // PACKETSTORM: 83759 // JVNDB: JVNDB-2009-001336 // NVD: CVE-2009-0945

REFERENCES

url:http://support.apple.com/kb/ht3549

Trust: 1.9

url:http://www.securityfocus.com/bid/34924

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta09-133a.html

Trust: 1.9

url:http://www.securitytracker.com/id?1022207

Trust: 1.9

url:http://secunia.com/advisories/35056

Trust: 1.9

url:http://secunia.com/advisories/35074

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/1297

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/1298

Trust: 1.9

url:http://code.google.com/p/chromium/issues/detail?id=9019

Trust: 1.4

url:http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html

Trust: 1.4

url:http://www.zerodayinitiative.com/advisories/zdi-09-022

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2009/may/msg00000.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2009/may/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2009/may/msg00002.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html

Trust: 1.1

url:http://www.securityfocus.com/archive/1/503594/100/0/threaded

Trust: 1.1

url:http://support.apple.com/kb/ht3550

Trust: 1.1

url:http://support.apple.com/kb/ht3639

Trust: 1.1

url:http://www.debian.org/security/2009/dsa-1950

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-july/msg00303.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-july/msg01177.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-july/msg01196.html

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11584

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2009-1130.html

Trust: 1.1

url:http://secunia.com/advisories/35095

Trust: 1.1

url:http://secunia.com/advisories/35576

Trust: 1.1

url:http://secunia.com/advisories/35805

Trust: 1.1

url:http://secunia.com/advisories/36062

Trust: 1.1

url:http://secunia.com/advisories/36461

Trust: 1.1

url:http://secunia.com/advisories/36790

Trust: 1.1

url:http://secunia.com/advisories/37746

Trust: 1.1

url:http://secunia.com/advisories/43068

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-822-1

Trust: 1.1

url:https://usn.ubuntu.com/823-1/

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-836-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-857-1

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/1321

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/1621

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50477

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0945

Trust: 0.9

url:http://xforce.iss.net/xforce/xfdb/50477

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-133a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-12

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0945

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa09-133a.html

Trust: 0.8

url:http://websvn.kde.org/?view=rev&revision=983302

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-0945

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-1725

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-1698

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-1687

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-1690

Trust: 0.4

url:http://www.zerodayinitiative.com/advisories/zdi-09-022/

Trust: 0.3

url:http://www.google.com/chrome

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:/archive/1/503594

Trust: 0.3

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0255.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1711

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-1712

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.2

url:http://packages.debian.org/<pkg>

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://security.debian.org/

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-doc-html_3.5.10-0ubuntu1~hardy1.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1709

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-doc_4.4.3-1+lenny1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-doc-html_4.4.3-1+lenny1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1699

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3-1+lenny1.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2700

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-psql_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-designer_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dev_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1713

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-demos_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-script_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-ibase_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-svg_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtgui4_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-test_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-help_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xml_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-qt3support_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-gui_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-x11_4.4.3-1+lenny1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-core_4.4.3-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-network_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbus_4.4.3-1+lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-designer_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-dev-tools_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-assistant_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-sql_4.4.3-1+lenny1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qtconfig_4.4.3-1+lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-dbg_4.4.3-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/qt4-qmake_4.4.3-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqtcore4_4.4.3-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/q/qt4-x11/libqt4-opengl_4.4.3-1+lenny1_armel.deb

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0689

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2537

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0689

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2537

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1687

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2702

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1690

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2702

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-2ubuntu0.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-4ubuntu0.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_hppa.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1697

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-dev_1.0.1-4+lenny2_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1714

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1694

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_sparc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1693

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1684

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_armel.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1695

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_ia64.deb

Trust: 0.1

sources: ZDI: ZDI-09-022 // VULHUB: VHN-38391 // BID: 34924 // PACKETSTORM: 80577 // PACKETSTORM: 85920 // PACKETSTORM: 85663 // PACKETSTORM: 77670 // PACKETSTORM: 81589 // PACKETSTORM: 83759 // JVNDB: JVNDB-2009-001336 // NVD: CVE-2009-0945

CREDITS

Nils

Trust: 0.7

sources: ZDI: ZDI-09-022

SOURCES

db:ZDIid:ZDI-09-022
db:VULHUBid:VHN-38391
db:BIDid:34924
db:PACKETSTORMid:80577
db:PACKETSTORMid:85920
db:PACKETSTORMid:85663
db:PACKETSTORMid:77670
db:PACKETSTORMid:81589
db:PACKETSTORMid:83759
db:JVNDBid:JVNDB-2009-001336
db:NVDid:CVE-2009-0945

LAST UPDATE DATE

2025-07-10T22:19:43.245000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-022date:2009-05-13T00:00:00
db:VULHUBid:VHN-38391date:2018-10-10T00:00:00
db:BIDid:34924date:2015-04-13T20:15:00
db:JVNDBid:JVNDB-2009-001336date:2009-06-29T00:00:00
db:NVDid:CVE-2009-0945date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-022date:2009-05-13T00:00:00
db:VULHUBid:VHN-38391date:2009-05-13T00:00:00
db:BIDid:34924date:2009-05-12T00:00:00
db:PACKETSTORMid:80577date:2009-08-25T02:40:16
db:PACKETSTORMid:85920date:2010-02-04T06:11:28
db:PACKETSTORMid:85663date:2010-01-27T15:51:58
db:PACKETSTORMid:77670date:2009-05-20T01:23:12
db:PACKETSTORMid:81589date:2009-09-24T02:26:59
db:PACKETSTORMid:83759date:2009-12-13T23:35:12
db:JVNDBid:JVNDB-2009-001336date:2009-06-29T00:00:00
db:NVDid:CVE-2009-0945date:2009-05-13T17:30:00.187