ID

VAR-200907-0748


CVE

CVE-2009-2408


TITLE

Mozilla NSS Null character CA SSL Certificate Verification Bypass Security Restriction Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200907-442

DESCRIPTION

Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5. The NSS library is used by a number of applications, including Mozilla Firefox, Thunderbird, and SeaMonkey. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. NOTE (August 6, 2009): This BID had included a similar issue in Fetchmail, but that issue is now documented in BID 35951 (Fetchmail NULL Character CA SSL Certificate Validation Security Bypass Vulnerability). The product provides cross-platform support for SSL, S/MIME and other Internet security standards. There is a mismatch between the NSS library's handling of the domain name in the SSL certificate between the SSL client and the CA that issued the server certificate. If a malicious user requests a certificate from a hostname with an invalid null character, most CAs will issue a certificate as long as the requester has the domain specified after the null character, but most SSL clients (browsers) will ignore this part of the name, Using a null character before the portion of validation allows an attacker to use a fake certificate in a man-in-the-middle attack to establish a false trust relationship. A vulnerability was found in xmltok_impl.c (expat) that with specially crafted XML could be exploited and lead to a denial of service attack. Related to CVE-2009-2625. This update provides the latest version of Thunderbird which are not vulnerable to these issues. The new packages addresses this problem. An input sanitization flaw was found in the KSSL (KDE SSL Wrapper) API. An attacker could supply a specially-crafted SSL certificate (for example, via a web page) to an application using KSSL, such as the Konqueror web browser, causing misleading information to be presented to the user, possibly tricking them into accepting the certificate as valid (CVE-2011-3365). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3365 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: 8c6545c176b2716248c33e52135a3e2d 2010.1/i586/kdelibs4-core-4.4.5-0.4mdv2010.2.i586.rpm e54c7a21386ff85f46471fda6135ff6c 2010.1/i586/kdelibs4-devel-4.4.5-0.4mdv2010.2.i586.rpm 243c4d3db4a9e95a393f97e74818488e 2010.1/i586/libkde3support4-4.4.5-0.4mdv2010.2.i586.rpm 2b62c63d46a66adf26667731ddca4a06 2010.1/i586/libkdecore5-4.4.5-0.4mdv2010.2.i586.rpm 025038d3783371e8f46d11eaf204e65f 2010.1/i586/libkdefakes5-4.4.5-0.4mdv2010.2.i586.rpm 9a3bfa3d242e1d45194c4f55f812c67d 2010.1/i586/libkdesu5-4.4.5-0.4mdv2010.2.i586.rpm e9c69b97be0d6c7adcf7233c1d590dc6 2010.1/i586/libkdeui5-4.4.5-0.4mdv2010.2.i586.rpm 1ecfc8e228818bf267979da7428ba24a 2010.1/i586/libkdewebkit5-4.4.5-0.4mdv2010.2.i586.rpm 2be64f84a3a0160d353eaf4a66c88b1c 2010.1/i586/libkdnssd4-4.4.5-0.4mdv2010.2.i586.rpm 44fc6a0928497b64217bc06637ecc219 2010.1/i586/libkfile4-4.4.5-0.4mdv2010.2.i586.rpm e148b42fa8180b02aa3c7c54089cd16e 2010.1/i586/libkhtml5-4.4.5-0.4mdv2010.2.i586.rpm c17229d3aff113fee855eb647b2ee891 2010.1/i586/libkimproxy4-4.4.5-0.4mdv2010.2.i586.rpm 19876055e3b367010fd3a156a86a36ad 2010.1/i586/libkio5-4.4.5-0.4mdv2010.2.i586.rpm 5090009d080971d3ab92f788f18f1e26 2010.1/i586/libkjs4-4.4.5-0.4mdv2010.2.i586.rpm 8c2065a0cb35e2cc182b6bd0db267d62 2010.1/i586/libkjsapi4-4.4.5-0.4mdv2010.2.i586.rpm ed3966642b6a5d54ecffb6fc9a8b6290 2010.1/i586/libkjsembed4-4.4.5-0.4mdv2010.2.i586.rpm 008fe65285eaf4ba2d9f7c0655230c52 2010.1/i586/libkmediaplayer4-4.4.5-0.4mdv2010.2.i586.rpm 001fbc71b4da46f199b505c58e0c6228 2010.1/i586/libknewstuff2_4-4.4.5-0.4mdv2010.2.i586.rpm 672553fad8848265e1ba408f43bf7781 2010.1/i586/libknewstuff34-4.4.5-0.4mdv2010.2.i586.rpm 13cf045179be91975700fa3310a0fc70 2010.1/i586/libknotifyconfig4-4.4.5-0.4mdv2010.2.i586.rpm 3752242079665a17a3a35ac4c05484bd 2010.1/i586/libkntlm4-4.4.5-0.4mdv2010.2.i586.rpm af471317415306fdfbb5ff9d3c49ceea 2010.1/i586/libkparts4-4.4.5-0.4mdv2010.2.i586.rpm 8d3c2e7c7ba723e56bc090786d1bf96c 2010.1/i586/libkpty4-4.4.5-0.4mdv2010.2.i586.rpm b5648f3780cdc55c57a0d03d3fb7cc97 2010.1/i586/libkrosscore4-4.4.5-0.4mdv2010.2.i586.rpm ea771f370b730efa9c4019c8ceac1c22 2010.1/i586/libkrossui4-4.4.5-0.4mdv2010.2.i586.rpm 44dc92b4ff070db13c9dfb4954dcfa75 2010.1/i586/libktexteditor4-4.4.5-0.4mdv2010.2.i586.rpm 926b45cc828f8f53d63a6030d278e5bd 2010.1/i586/libkunitconversion4-4.4.5-0.4mdv2010.2.i586.rpm 4fd1c96ffa938806a5d055a4b61c3845 2010.1/i586/libkunittest4-4.4.5-0.4mdv2010.2.i586.rpm 99a712d56d383e91b17ac560a109d9ce 2010.1/i586/libkutils4-4.4.5-0.4mdv2010.2.i586.rpm 5db891d08fcfbe866da4a2cfc2c101ed 2010.1/i586/libnepomuk4-4.4.5-0.4mdv2010.2.i586.rpm 853dc3a02d9783bc7d4ed5586271f82a 2010.1/i586/libnepomukquery4-4.4.5-0.4mdv2010.2.i586.rpm 0b4d63fd1d8edd42a74ae1832694ef84 2010.1/i586/libplasma3-4.4.5-0.4mdv2010.2.i586.rpm fb356f0eb954f2871f0bd91ef4981f74 2010.1/i586/libsolid4-4.4.5-0.4mdv2010.2.i586.rpm ee166bc5ab6785306f330e4e13b59938 2010.1/i586/libthreadweaver4-4.4.5-0.4mdv2010.2.i586.rpm a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: e4f1f7f8407938fae5eee9be6daf6463 2010.1/x86_64/kdelibs4-core-4.4.5-0.4mdv2010.2.x86_64.rpm afc1815bfb3e5c1b17a5e774a86d8262 2010.1/x86_64/kdelibs4-devel-4.4.5-0.4mdv2010.2.x86_64.rpm acabd29c100952c3a8268f6e48ae729c 2010.1/x86_64/lib64kde3support4-4.4.5-0.4mdv2010.2.x86_64.rpm 4496e00fc526e1b331d5f7553ad759ab 2010.1/x86_64/lib64kdecore5-4.4.5-0.4mdv2010.2.x86_64.rpm 9f6dfb1b7af9299fb96941926e7d69e9 2010.1/x86_64/lib64kdefakes5-4.4.5-0.4mdv2010.2.x86_64.rpm 2e682ce762d8a60cc4322370567b5f6c 2010.1/x86_64/lib64kdesu5-4.4.5-0.4mdv2010.2.x86_64.rpm acd07b647db525427550f6763b936a7a 2010.1/x86_64/lib64kdeui5-4.4.5-0.4mdv2010.2.x86_64.rpm 4fb64c5e05fb52b0b2c5eb1a92fdb3d1 2010.1/x86_64/lib64kdewebkit5-4.4.5-0.4mdv2010.2.x86_64.rpm 4176fd87a0b92f2ee7d088f3d4a774d0 2010.1/x86_64/lib64kdnssd4-4.4.5-0.4mdv2010.2.x86_64.rpm eed83cf3b32bd23a0b16fce8d2834e9d 2010.1/x86_64/lib64kfile4-4.4.5-0.4mdv2010.2.x86_64.rpm d66febf0bb7e273fb687c144a36ac138 2010.1/x86_64/lib64khtml5-4.4.5-0.4mdv2010.2.x86_64.rpm 174ac58c7dc86ee4458526b5a2480662 2010.1/x86_64/lib64kimproxy4-4.4.5-0.4mdv2010.2.x86_64.rpm b7c162555f547ae0d9edbf71bfe04f0d 2010.1/x86_64/lib64kio5-4.4.5-0.4mdv2010.2.x86_64.rpm 5d89a4e23e342dee305e2107bfdc8c0e 2010.1/x86_64/lib64kjs4-4.4.5-0.4mdv2010.2.x86_64.rpm d2df6f4275de4ff6407188ada2785094 2010.1/x86_64/lib64kjsapi4-4.4.5-0.4mdv2010.2.x86_64.rpm 50ed7da9bcd068acb4819139eebb9026 2010.1/x86_64/lib64kjsembed4-4.4.5-0.4mdv2010.2.x86_64.rpm ad3c77de9a052f9b2612b15fb82be03f 2010.1/x86_64/lib64kmediaplayer4-4.4.5-0.4mdv2010.2.x86_64.rpm b9a8fbcdc54c359415075cf449ef6e4f 2010.1/x86_64/lib64knewstuff2_4-4.4.5-0.4mdv2010.2.x86_64.rpm 6d6c9151d9a634ca423770e919179b50 2010.1/x86_64/lib64knewstuff34-4.4.5-0.4mdv2010.2.x86_64.rpm fe7c248a30318f755bd0fe1b11f98fe4 2010.1/x86_64/lib64knotifyconfig4-4.4.5-0.4mdv2010.2.x86_64.rpm 888e7081a5be8ac0e1cbd7b47fd13ae7 2010.1/x86_64/lib64kntlm4-4.4.5-0.4mdv2010.2.x86_64.rpm 5c5e89cc9cd02ebf9267b7ee5faf1278 2010.1/x86_64/lib64kparts4-4.4.5-0.4mdv2010.2.x86_64.rpm 6c6bb95f61e8c26cc50902024303b3fe 2010.1/x86_64/lib64kpty4-4.4.5-0.4mdv2010.2.x86_64.rpm 22d1c3f2d8345743f1d834ecccd069d4 2010.1/x86_64/lib64krosscore4-4.4.5-0.4mdv2010.2.x86_64.rpm 502fb43a0a37496f2c11616d07fbbcbe 2010.1/x86_64/lib64krossui4-4.4.5-0.4mdv2010.2.x86_64.rpm d4fbf824ea3c54a902dc1e18e13756d0 2010.1/x86_64/lib64ktexteditor4-4.4.5-0.4mdv2010.2.x86_64.rpm 927ed8af9b7e7c575c9e7984f4e80a89 2010.1/x86_64/lib64kunitconversion4-4.4.5-0.4mdv2010.2.x86_64.rpm 12cd248453e3a3791de5f87f988eb430 2010.1/x86_64/lib64kunittest4-4.4.5-0.4mdv2010.2.x86_64.rpm 2f9420a8dadfb08821bd911a3adb7b3f 2010.1/x86_64/lib64kutils4-4.4.5-0.4mdv2010.2.x86_64.rpm b9c9f1d4e0c8a51fd5d081b05b362def 2010.1/x86_64/lib64nepomuk4-4.4.5-0.4mdv2010.2.x86_64.rpm e80871c0e9b5b0c72a3ea2b2f86e64d1 2010.1/x86_64/lib64nepomukquery4-4.4.5-0.4mdv2010.2.x86_64.rpm 29b23d3b31f4db91dc73f6a37ea02db1 2010.1/x86_64/lib64plasma3-4.4.5-0.4mdv2010.2.x86_64.rpm c2ba7f9a9f2202330a1c7bf46004f41d 2010.1/x86_64/lib64solid4-4.4.5-0.4mdv2010.2.x86_64.rpm 8a0ec353667253b3e3899c6980052999 2010.1/x86_64/lib64threadweaver4-4.4.5-0.4mdv2010.2.x86_64.rpm a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm Mandriva Linux 2011: 44421dc86e6c96eb9f4a1b835c40006d 2011/i586/kdelibs4-core-4.6.5-9.1-mdv2011.0.i586.rpm 31ef78219ce113dc91ba2d45ca166276 2011/i586/kdelibs4-devel-4.6.5-9.1-mdv2011.0.i586.rpm c72c7b24079aab97ce0923f5dd0bdf24 2011/i586/libkatepartinterfaces4-4.6.5-9.1-mdv2011.0.i586.rpm 882b577dc3c6a9b9f1c7872046cbffb4 2011/i586/libkcmutils4-4.6.5-9.1-mdv2011.0.i586.rpm b1cdc2769a17e075b43a2d1e49eb4efb 2011/i586/libkde3support4-4.6.5-9.1-mdv2011.0.i586.rpm 2aa0a579e90ea8b0015bcbccdeb4077e 2011/i586/libkdecore5-4.6.5-9.1-mdv2011.0.i586.rpm 105f203a2470d8d3aaf4381ba47f4a20 2011/i586/libkdefakes5-4.6.5-9.1-mdv2011.0.i586.rpm 3ad287cab02d774df12b8f5cedd2b7cb 2011/i586/libkdesu5-4.6.5-9.1-mdv2011.0.i586.rpm 4d4dcdf956ca0194bc2da5d901e14910 2011/i586/libkdeui5-4.6.5-9.1-mdv2011.0.i586.rpm c5d8b2ced514be22ff42c8a610dea367 2011/i586/libkdewebkit5-4.6.5-9.1-mdv2011.0.i586.rpm 89d3df52d5659ba172b5021aaa0800ba 2011/i586/libkdnssd4-4.6.5-9.1-mdv2011.0.i586.rpm 6f6e7b50cc22c4d0efec46ad85c52145 2011/i586/libkemoticons4-4.6.5-9.1-mdv2011.0.i586.rpm f9e7fb1a985fee36db209259643e3d43 2011/i586/libkfile4-4.6.5-9.1-mdv2011.0.i586.rpm ce0c07b3ab9ffb23074e3dcfd311251f 2011/i586/libkhtml5-4.6.5-9.1-mdv2011.0.i586.rpm 3e4bcd7edf1e6ddb2d2a75a563e83362 2011/i586/libkidletime4-4.6.5-9.1-mdv2011.0.i586.rpm bc4ad21bf5df0428897249edc07ee139 2011/i586/libkimproxy4-4.6.5-9.1-mdv2011.0.i586.rpm 86d9aa7a95e0b3c8c3736bced5030529 2011/i586/libkio5-4.6.5-9.1-mdv2011.0.i586.rpm 42894f5fef6b3955f4cc7cdc39a9b8b6 2011/i586/libkjs4-4.6.5-9.1-mdv2011.0.i586.rpm 5293f2f284c1df6466a84cfd33426b21 2011/i586/libkjsapi4-4.6.5-9.1-mdv2011.0.i586.rpm 600ac620222614c9240c56e35061dd5f 2011/i586/libkjsembed4-4.6.5-9.1-mdv2011.0.i586.rpm e6b032340b8f8b45f5e3dea24d4b795e 2011/i586/libkmediaplayer4-4.6.5-9.1-mdv2011.0.i586.rpm a9e4510933f71ee9354d41dc7f5c21f9 2011/i586/libknewstuff2_4-4.6.5-9.1-mdv2011.0.i586.rpm 4fffe4a09ab06dbb13e19ef552c765d3 2011/i586/libknewstuff3_4-4.6.5-9.1-mdv2011.0.i586.rpm 6176f21ff0870d298cad30f19cbc5985 2011/i586/libknotifyconfig4-4.6.5-9.1-mdv2011.0.i586.rpm aaca814c82291a16831052da452b072a 2011/i586/libkntlm4-4.6.5-9.1-mdv2011.0.i586.rpm 38441eea27e26fded337b55d1c7187b8 2011/i586/libkparts4-4.6.5-9.1-mdv2011.0.i586.rpm e1d9a6f2b3cf3546fffca8b3092b96d7 2011/i586/libkprintutils4-4.6.5-9.1-mdv2011.0.i586.rpm 78764e6b917983c8e337c69ac99d17f4 2011/i586/libkpty4-4.6.5-9.1-mdv2011.0.i586.rpm 8b727fc309bbb81de1d8ace536351303 2011/i586/libkrosscore4-4.6.5-9.1-mdv2011.0.i586.rpm 051aa118fdbcc20755754c2a4a45fdba 2011/i586/libkrossui4-4.6.5-9.1-mdv2011.0.i586.rpm c135b1698036881db6ab90cb448c265b 2011/i586/libktexteditor4-4.6.5-9.1-mdv2011.0.i586.rpm f7526412295bd86a3fdf26ad6bc8e962 2011/i586/libkunitconversion4-4.6.5-9.1-mdv2011.0.i586.rpm 603c837536ad6ca871ffe589c747c0f5 2011/i586/libkunittest4-4.6.5-9.1-mdv2011.0.i586.rpm e4c09f0fcb6f28bf768d337c62686eac 2011/i586/libkutils4-4.6.5-9.1-mdv2011.0.i586.rpm ac93402de1c9e45b65944aaeb8e425bf 2011/i586/libnepomuk4-4.6.5-9.1-mdv2011.0.i586.rpm ea8ba57a4f5e91529a074b3b5ddafb63 2011/i586/libnepomukquery4-4.6.5-9.1-mdv2011.0.i586.rpm a1ca1f682adaea8192cdf17082179790 2011/i586/libnepomukutils4-4.6.5-9.1-mdv2011.0.i586.rpm beb7c3df35c4208608541faba3e3cff1 2011/i586/libplasma3-4.6.5-9.1-mdv2011.0.i586.rpm 76cf8c65bc34fd9981ebd776fae7dd6b 2011/i586/libsolid4-4.6.5-9.1-mdv2011.0.i586.rpm 4dbe0bea09b0efcb77e4f97af52ee554 2011/i586/libthreadweaver4-4.6.5-9.1-mdv2011.0.i586.rpm 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm Mandriva Linux 2011/X86_64: a416f173f6fee7f10e01e940622b03c7 2011/x86_64/kdelibs4-core-4.6.5-9.1-mdv2011.0.x86_64.rpm fdc8c171954de23a0161faec669953a3 2011/x86_64/kdelibs4-devel-4.6.5-9.1-mdv2011.0.x86_64.rpm 389d42165fcb6c8853bda9f8fe352438 2011/x86_64/lib64katepartinterfaces4-4.6.5-9.1-mdv2011.0.x86_64.rpm 553e0d225fdc7335afd7571bc404b808 2011/x86_64/lib64kcmutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm 1b073a351c1e5d2c350a908e361afde7 2011/x86_64/lib64kde3support4-4.6.5-9.1-mdv2011.0.x86_64.rpm 8a10b775f1dc843404e518eb1dd15263 2011/x86_64/lib64kdecore5-4.6.5-9.1-mdv2011.0.x86_64.rpm 98b3c619dab6bcf91ebaea35dc59f24e 2011/x86_64/lib64kdefakes5-4.6.5-9.1-mdv2011.0.x86_64.rpm 3035d04055ef41dc710a9a5cfa15f48f 2011/x86_64/lib64kdesu5-4.6.5-9.1-mdv2011.0.x86_64.rpm 4bb1aade6cbc696aa298a0053a2778aa 2011/x86_64/lib64kdeui5-4.6.5-9.1-mdv2011.0.x86_64.rpm 05593647a56638371c4b06f8eec04199 2011/x86_64/lib64kdewebkit5-4.6.5-9.1-mdv2011.0.x86_64.rpm 9a61f92a25556635fdf01bd629079c05 2011/x86_64/lib64kdnssd4-4.6.5-9.1-mdv2011.0.x86_64.rpm ebb20032192f17c4d8d46d7a117d6186 2011/x86_64/lib64kemoticons4-4.6.5-9.1-mdv2011.0.x86_64.rpm 7c16488a8271d8e0440f886a1e7a3e59 2011/x86_64/lib64kfile4-4.6.5-9.1-mdv2011.0.x86_64.rpm f2b43f9f213e29c69f9bcf1fe30a0f91 2011/x86_64/lib64khtml5-4.6.5-9.1-mdv2011.0.x86_64.rpm e01dd3d898e30c921275e9e3fd7fe8a0 2011/x86_64/lib64kidletime4-4.6.5-9.1-mdv2011.0.x86_64.rpm bf2a67810c9530f7d06584fe92a086cd 2011/x86_64/lib64kimproxy4-4.6.5-9.1-mdv2011.0.x86_64.rpm 3dc38dd2200e7765178b756d18355c5e 2011/x86_64/lib64kio5-4.6.5-9.1-mdv2011.0.x86_64.rpm 479d0258813eb4ce2112efa290ac992f 2011/x86_64/lib64kjs4-4.6.5-9.1-mdv2011.0.x86_64.rpm 5821bd4cb36e6ae484fed3f3b178f64c 2011/x86_64/lib64kjsapi4-4.6.5-9.1-mdv2011.0.x86_64.rpm 97d0a7073257b5d38ebd89608b230cb2 2011/x86_64/lib64kjsembed4-4.6.5-9.1-mdv2011.0.x86_64.rpm b8201d7c86d380f53a747569c86cc125 2011/x86_64/lib64kmediaplayer4-4.6.5-9.1-mdv2011.0.x86_64.rpm a7470e5a2f9f1c2802a70386d94734d9 2011/x86_64/lib64knewstuff2_4-4.6.5-9.1-mdv2011.0.x86_64.rpm d10cff1d4ae24594f65017681b351aa4 2011/x86_64/lib64knewstuff3_4-4.6.5-9.1-mdv2011.0.x86_64.rpm 40625fb25f84a66747bfdb5e8c33397f 2011/x86_64/lib64knotifyconfig4-4.6.5-9.1-mdv2011.0.x86_64.rpm 7a58f4dad0d080ad1bb4f9d0b7b55721 2011/x86_64/lib64kntlm4-4.6.5-9.1-mdv2011.0.x86_64.rpm 216f06e8c9bc940a7c1bc96c0be60c85 2011/x86_64/lib64kparts4-4.6.5-9.1-mdv2011.0.x86_64.rpm d2bf6a48431bfa87b20274b6a916ed07 2011/x86_64/lib64kprintutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm 17e748ccf383dcd76bf54370bae5b60b 2011/x86_64/lib64kpty4-4.6.5-9.1-mdv2011.0.x86_64.rpm 2980ae5e1eb2df517b9ac30f815e2b86 2011/x86_64/lib64krosscore4-4.6.5-9.1-mdv2011.0.x86_64.rpm a3daeac9197c566f3112a0efc2a20440 2011/x86_64/lib64krossui4-4.6.5-9.1-mdv2011.0.x86_64.rpm 0eb6aa884c8725aa2cc7cc5947f10fce 2011/x86_64/lib64ktexteditor4-4.6.5-9.1-mdv2011.0.x86_64.rpm e58f316e4fe7ec5412c6f24b263f61d8 2011/x86_64/lib64kunitconversion4-4.6.5-9.1-mdv2011.0.x86_64.rpm a07e9a42d9d34450fcdaa4a81fee7e1b 2011/x86_64/lib64kunittest4-4.6.5-9.1-mdv2011.0.x86_64.rpm 34610271f7de5ba3c6226d857831162f 2011/x86_64/lib64kutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm ddf3eb523f5b29dd49b937b63d3efce7 2011/x86_64/lib64nepomuk4-4.6.5-9.1-mdv2011.0.x86_64.rpm eacd8f03c285571b4724f93b4f80525c 2011/x86_64/lib64nepomukquery4-4.6.5-9.1-mdv2011.0.x86_64.rpm 9fc98f8e2958ad971b73a887ecc25d75 2011/x86_64/lib64nepomukutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm b66922bbe21ba37ab38a362eb279b399 2011/x86_64/lib64plasma3-4.6.5-9.1-mdv2011.0.x86_64.rpm 412dee5f9cbf514d0cc8e7b6c4bb7036 2011/x86_64/lib64solid4-4.6.5-9.1-mdv2011.0.x86_64.rpm ed8eb7bd7d026d75615bda14538fe6af 2011/x86_64/lib64threadweaver4-4.6.5-9.1-mdv2011.0.x86_64.rpm 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFOr+brmqjQ0CJFipgRApQNAKDVWJ591FTnmPG9EY+uaQ0yn+SKfwCg2PkW N0/0RYLF0JoU7ErOvYOPwxA= =+mKq -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2408 Dan Kaminsky and Moxie Marlinspike discovered that icedove does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate (MFSA 2009-42). CVE-2009-2404 Moxie Marlinspike reported a heap overflow vulnerability in the code that handles regular expressions in certificate names (MFSA 2009-43). CVE-2009-2463 monarch2020 discovered an integer overflow n a base64 decoding function (MFSA 2010-07). CVE-2009-3072 Josh Soref discovered a crash in the BinHex decoder (MFSA 2010-07). CVE-2009-3075 Carsten Book reported a crash in the JavaScript engine (MFSA 2010-07). CVE-2010-0163 Ludovic Hirlimann reported a crash indexing some messages with attachments, which could lead to the execution of arbitrary code (MFSA 2010-07). For the stable distribution (lenny), these problems have been fixed in version 2.0.0.24-0lenny1. Due to a problem with the archive system it is not possible to release all architectures. The missing architectures will be installed into the archive once they become available. For the testing distribution squeeze and the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your icedove packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz Size/MD5 checksum: 35856543 3bf6e40cddf593ddc1a66b9e721f12b9 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc Size/MD5 checksum: 1668 111c1a93c1ce498715e231272123f841 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz Size/MD5 checksum: 103260 4661b0c8c170d58f844337699cb8ca1a alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 3723382 12c7fe63b0a5c59680ca36200a6f7d20 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 61132 c0f96569d4ea0f01cff3950572b3dda9 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 57375560 95a614e1cb620fad510eb51ae5cb37c5 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 13468190 03a629abf18130605927f5817b097bac amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 57584134 7d909c9f1b67d4758e290dc2c1dc01f2 http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 3937168 de9dda16f94e696de897bec6c8d45f90 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 12384488 8d1632f7511c711a1d2ea940f7e451a2 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 59114 fae947071c0de6ebce316decbce61f9a arm architecture (ARM) http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 3929902 5ab6f673b34770278270fb7862986b0b http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 53746 c9c53e8a42d85fe5f4fa8e2a85e55629 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 56491578 8eb38c6f99c501556506ac6790833941 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 10943350 d7c0badfe9210ce5341eb17ab7e71ca2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 3944678 2a9dc50b61420b4fdf8f3a4d378bb484 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 60554 7dcd739363cff3cc4bda659b82856536 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 58523174 6780e8f9de0f2ed0c3bd533d03853d85 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 13952170 88674f31191b07cd76ea5d366c545f1d i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 10951904 52ce1587c6eb95b7f8b63ccedf224d88 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 54838 101de9e837bea9391461074481bf770f http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 3924810 6ecf3693cce2ae97fd0bbdafc1ff06f6 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 56543048 73d1684cf69bed0441393abb46610433 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 3756914 615afd30bf893d2d32bbacedf1f7ff8e http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 16545566 0444c7198e94ab59e103e60bf86a2aa2 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 66302 f8800140b3797d4a4267a5dac0043995 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 57199564 5df5808f91ecdf6ac49f0e922b1a0234 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 12112586 4b40106b68670c726624348c0cb8bd1f http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 59511730 226cdd43af9dffb4132002044120769c http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 56670 72e58731ac68f2c599704a3e7ca45d4c http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 3942470 e8454d41a095226a2d252f10da795d96 These files will probably be moved into the stable distribution on its next update. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2010-0001 Synopsis: ESX Service Console updates for nss and nspr Issue date: 2010-01-06 Updated on: 2010-01-06 (initial release of advisory) CVE numbers: CVE-2009-2409 CVE-2009-2408 CVE-2009-2404 CVE-2009-1563 CVE-2009-3274 CVE-2009-3370 CVE-2009-3372 CVE-2009-3373 CVE-2009-3374 CVE-2009-3375 CVE-2009-3376 CVE-2009-3380 CVE-2009-3382 - ----------------------------------------------------------------------- 1. Summary Update for Service Console packages nss and nspr 2. Relevant releases VMware ESX 4.0 without patch ESX400-200912403-SG 3. Problem Description a. Update for Service Console packages nss and nspr Service console packages for Network Security Services (NSS) and NetScape Portable Runtime (NSPR) are updated to versions nss-3.12.3.99.3-1.2157 and nspr-4.7.6-1.2213 respectively. This patch fixes several security issues in the service console packages for NSS and NSPR. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-2409, CVE-2009-2408, CVE-2009-2404, CVE-2009-1563, CVE-2009-3274, CVE-2009-3370, CVE-2009-3372, CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376, CVE-2009-3380, and CVE-2009-3382 to these issues. The following table lists what action remediates the vulnerability (column 4) if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX 4.0 ESX ESX400-200912403-SG ESX 3.5 ESX not affected ESX 3.0.3 ESX not affected ESX 3.0.2 ESX not affected ESX 2.5.5 ESX not affected vMA 4.0 RHEL5 affected, patch pending * hosted products are VMware Workstation, Player, ACE, Server, Fusion. 4. Solution Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file. ESX 4.0 ------- ESX400-200912403-SG https://hostupdate.vmware.com/software/VUM/OFFLINE/release-181-20091231-153046/ESX400-200912001.zip md5sum: 78c6cf139b7941dc736c9d3a41deae77 sha1sum: 36df3a675fbd3c8c8830f00637e37ee716bdac59 http://kb.vmware.com/kb/1016293 To install an individual bulletin use esxupdate with the -b option. esxupdate --bundle=ESX400-200912001.zip -b ESX400-200912403-SG update 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382 - ------------------------------------------------------------------------ 6. Change log 2010-01-06 VMSA-2010-0001 Initial security advisory after release of patch ESX400-200912403-SG for ESX 4.0 on 2010-01-06. - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2010 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (MingW32) iD8DBQFLRYwLS2KysvBH1xkRArmBAJoDcO5waCyCE+lfmEwuILVjcqeLngCcCzNo HgNlBjOx5iQw7etlwwpbyuo= =bIJJ -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Network Security Services Multiple Vulnerabilities SECUNIA ADVISORY ID: SA36093 VERIFY ADVISORY: http://secunia.com/advisories/36093/ DESCRIPTION: Some vulnerabilities have been reported in Network Security Services, which can potentially be exploited by malicious people to bypass certain security restrictions or to compromise a vulnerable system. 1) An error in the regular expression parser when matching common names in certificates can be exploited to cause a heap-based buffer overflow, e.g. via a specially crafted certificate signed by a trusted CA or when a user accepts a specially crafted certificate. 2) An error exists in the parsing of certain certificate fields, which can be exploited to e.g. get a client to accept a specially crafted certificate by mistake. SOLUTION: Update to version 3.12.3 or later. PROVIDED AND/OR DISCOVERED BY: Red Hat credits: 1) Moxie Marlinspike 2) Dan Kaminsky ORIGINAL ADVISORY: https://bugzilla.redhat.com/show_bug.cgi?id=512912 https://bugzilla.redhat.com/show_bug.cgi?id=510251 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.89

sources: NVD: CVE-2009-2408 // BID: 35888 // VULHUB: VHN-39854 // PACKETSTORM: 81877 // PACKETSTORM: 106472 // PACKETSTORM: 81228 // PACKETSTORM: 87886 // PACKETSTORM: 84923 // PACKETSTORM: 80502 // PACKETSTORM: 79888

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.3

vendor:susemodel:linux enterprisescope:eqversion:11.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.10

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:3.0.13

Trust: 1.0

vendor:opensusemodel:opensusescope:gteversion:10.3

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 1.0

vendor:opensusemodel:opensusescope:lteversion:11.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.04

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:ltversion:2.0.0.23

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:mozillamodel:network security servicesscope:ltversion:3.12.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:ltversion:1.1.18

Trust: 1.0

vendor:susemodel:linux enterprisescope:eqversion:10.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.6

vendor:vmwaremodel:vmascope:eqversion:4.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:turbolinuxmodel:wizpyscope:eqversion:0

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:fujiscope:eqversion:0

Trust: 0.3

vendor:turbolinuxmodel:clientscope:eqversion:2008

Trust: 0.3

vendor:susemodel:linux enterprise server debuginfoscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise sp3 debuginfoscope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sp2 debuginfoscope:eqversion:10

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:9

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:11

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 98scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 51scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 48scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 124scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 123scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 122scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 121scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 120scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 119scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 118scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 117scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 116scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 115scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 114scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 113scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 112scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux es 4.7.zscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux 5.2.z serverscope: - version: -

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:redmodel:hat enterprise linux as 4.7.zscope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.17

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.16

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.15

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.14

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.13

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.12

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.9

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.8

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.7

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.3

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.1

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:1.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.9.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.9

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.8

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.7

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.6.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.2.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.05

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows serverscope:eqversion:7.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp2scope:eqversion:7.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp1scope:eqversion:7.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows serverscope:eqversion:6.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix serverscope:eqversion:7.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix server sp1scope:eqversion:7.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix serverscope:eqversion:6.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix clientscope:eqversion:7.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix client sp1scope:eqversion:7.0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix clientscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:vmwaremodel:esx server esx400-200912403scope:neversion:4.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 125scope:neversion: -

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:2.0.0.23

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.12.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.5

Trust: 0.3

vendor:mozillamodel:caminoscope:neversion:1.6.9

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp1scope:neversion:7.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix server sp1scope:neversion:7.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix client sp1scope:neversion:7.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.2

Trust: 0.3

sources: BID: 35888 // CNNVD: CNNVD-200907-442 // NVD: CVE-2009-2408

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2408
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200907-442
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39854
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2408
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-39854
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2009-2408
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-39854 // CNNVD: CNNVD-200907-442 // NVD: CVE-2009-2408

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.0

problemtype:CWE-20

Trust: 0.1

sources: VULHUB: VHN-39854 // NVD: CVE-2009-2408

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 87886 // CNNVD: CNNVD-200907-442

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-200907-442

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-39854

EXTERNAL IDS

db:NVDid:CVE-2009-2408

Trust: 2.7

db:SECUNIAid:37098

Trust: 1.1

db:SECUNIAid:36125

Trust: 1.1

db:SECUNIAid:36088

Trust: 1.1

db:SECUNIAid:36434

Trust: 1.1

db:SECUNIAid:36157

Trust: 1.1

db:SECUNIAid:36669

Trust: 1.1

db:SECUNIAid:36139

Trust: 1.1

db:OSVDBid:56723

Trust: 1.1

db:VUPENid:ADV-2009-3184

Trust: 1.1

db:VUPENid:ADV-2009-2085

Trust: 1.1

db:SECTRACKid:1022632

Trust: 1.1

db:CNNVDid:CNNVD-200907-442

Trust: 0.7

db:AUSCERTid:ESB-2019.2561

Trust: 0.6

db:JUNIPERid:JSA10939

Trust: 0.6

db:BIDid:35888

Trust: 0.4

db:PACKETSTORMid:81228

Trust: 0.2

db:PACKETSTORMid:81877

Trust: 0.2

db:PACKETSTORMid:106472

Trust: 0.2

db:PACKETSTORMid:87886

Trust: 0.2

db:PACKETSTORMid:81880

Trust: 0.1

db:PACKETSTORMid:83397

Trust: 0.1

db:PACKETSTORMid:80223

Trust: 0.1

db:PACKETSTORMid:82183

Trust: 0.1

db:PACKETSTORMid:83396

Trust: 0.1

db:VULHUBid:VHN-39854

Trust: 0.1

db:PACKETSTORMid:84923

Trust: 0.1

db:PACKETSTORMid:80547

Trust: 0.1

db:PACKETSTORMid:80502

Trust: 0.1

db:SECUNIAid:36093

Trust: 0.1

db:PACKETSTORMid:79888

Trust: 0.1

sources: VULHUB: VHN-39854 // BID: 35888 // PACKETSTORM: 81877 // PACKETSTORM: 106472 // PACKETSTORM: 81228 // PACKETSTORM: 87886 // PACKETSTORM: 84923 // PACKETSTORM: 80547 // PACKETSTORM: 80502 // PACKETSTORM: 79888 // CNNVD: CNNVD-200907-442 // NVD: CVE-2009-2408

REFERENCES

url:http://www.mozilla.org/security/announce/2009/mfsa2009-42.html

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=510251

Trust: 1.5

url:http://www.wired.com/threatlevel/2009/07/kaminsky/

Trust: 1.4

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1

Trust: 1.1

url:http://www.securitytracker.com/id?1022632

Trust: 1.1

url:http://secunia.com/advisories/36088

Trust: 1.1

url:http://secunia.com/advisories/36125

Trust: 1.1

url:http://secunia.com/advisories/36139

Trust: 1.1

url:http://secunia.com/advisories/36157

Trust: 1.1

url:http://secunia.com/advisories/36434

Trust: 1.1

url:http://secunia.com/advisories/36669

Trust: 1.1

url:http://secunia.com/advisories/37098

Trust: 1.1

url:http://osvdb.org/56723

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/2085

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/3184

Trust: 1.1

url:http://www.debian.org/security/2009/dsa-1874

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:197

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:216

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:217

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2009-1207.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2009-1432.html

Trust: 1.1

url:http://www.novell.com/linux/security/advisories/2009_48_firefox.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-810-1

Trust: 1.1

url:https://usn.ubuntu.com/810-2/

Trust: 1.1

url:http://isc.sans.org/diary.html?storyid=7003

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10751

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8458

Trust: 1.1

url:http://marc.info/?l=oss-security&m=125198917018936&w=2

Trust: 1.0

url:http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8&r2=1.11&f=h

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2009-2408

Trust: 0.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10939

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2561/

Trust: 0.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2408

Trust: 0.5

url:http://www.mandriva.com/security/

Trust: 0.5

url:http://www.mandriva.com/security/advisories

Trust: 0.5

url:http://awe.com/mark/blog/20090730.html

Trust: 0.3

url:http://caminobrowser.org/releases/1.6.9/

Trust: 0.3

url:https://www.noisebridge.net/pipermail/noisebridge-discuss/2009-september/008400.html

Trust: 0.3

url:https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html#marlinspike

Trust: 0.3

url:http://www.mozilla.com/en-us/

Trust: 0.3

url:http://www.mozilla.org/projects/security/pki/nss/

Trust: 0.3

url:http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf

Trust: 0.3

url:http://www.h-online.com/security/ssl-flaw-revealed-at-black-hat--/news/113880

Trust: 0.3

url:http://support.attachmate.com/techdocs/2565.html

Trust: 0.3

url:http://support.attachmate.com/techdocs/2566.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-269468-1

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-2404

Trust: 0.3

url:https://bugs.gentoo.org/show_bug.cgi?id=280615

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2409

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2404

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2409

Trust: 0.2

url:http://marc.info/?l=oss-security&amp;m=125198917018936&amp;w=2

Trust: 0.1

url:http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8&amp;r2=1.11&amp;f=h

Trust: 0.1

url:https://qa.mandriva.com/53129

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3365

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2702

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2702

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3365

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3072

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3075

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0163

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2463

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3274

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3382

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3376

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3373

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3274

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3370

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3372

Trust: 0.1

url:http://kb.vmware.com/kb/1016293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3374

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3375

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:https://hostupdate.vmware.com/software/vum/offline/release-181-20091231-153046/esx400-200912001.zip

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3374

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3380

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3382

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3376

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3380

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3375

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3372

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3370

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2625

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/36093/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=512912

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-39854 // BID: 35888 // PACKETSTORM: 81877 // PACKETSTORM: 106472 // PACKETSTORM: 81228 // PACKETSTORM: 87886 // PACKETSTORM: 84923 // PACKETSTORM: 80547 // PACKETSTORM: 80502 // PACKETSTORM: 79888 // CNNVD: CNNVD-200907-442 // NVD: CVE-2009-2408

CREDITS

Dan KaminskyMoxie Marlinspike

Trust: 0.6

sources: CNNVD: CNNVD-200907-442

SOURCES

db:VULHUBid:VHN-39854
db:BIDid:35888
db:PACKETSTORMid:81877
db:PACKETSTORMid:106472
db:PACKETSTORMid:81228
db:PACKETSTORMid:87886
db:PACKETSTORMid:84923
db:PACKETSTORMid:80547
db:PACKETSTORMid:80502
db:PACKETSTORMid:79888
db:CNNVDid:CNNVD-200907-442
db:NVDid:CVE-2009-2408

LAST UPDATE DATE

2025-06-26T21:56:00.737000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39854date:2018-10-03T00:00:00
db:BIDid:35888date:2015-03-19T08:13:00
db:CNNVDid:CNNVD-200907-442date:2019-07-16T00:00:00
db:NVDid:CVE-2009-2408date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39854date:2009-07-30T00:00:00
db:BIDid:35888date:2009-07-30T00:00:00
db:PACKETSTORMid:81877date:2009-10-08T18:12:38
db:PACKETSTORMid:106472date:2011-11-01T15:58:59
db:PACKETSTORMid:81228date:2009-09-11T23:49:04
db:PACKETSTORMid:87886date:2010-04-01T03:25:53
db:PACKETSTORMid:84923date:2010-01-07T19:33:17
db:PACKETSTORMid:80547date:2009-08-24T17:22:35
db:PACKETSTORMid:80502date:2009-08-22T04:37:33
db:PACKETSTORMid:79888date:2009-08-04T12:12:18
db:CNNVDid:CNNVD-200907-442date:2009-07-30T00:00:00
db:NVDid:CVE-2009-2408date:2009-07-30T19:30:00.313