ID

VAR-201202-0137


CVE

CVE-2011-3026


TITLE

Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers

Trust: 0.8

sources: CERT/CC: VU#849841

DESCRIPTION

Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation. Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers. These vulnerabilities could allow a remote attacker to execute arbitrary code on an affected system. libpng Contains an integer overflow vulnerability.Service disruption by a third party (DoS) You may be put into a state or affected by other details. libpng is prone to a remote integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Failed exploit attempts will likely crash the library. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2410-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff February 15, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libpng Vulnerability : integer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2011-3026 Jueri Aedla discovered an integer overflow in the libpng PNG library, which could lead to the execution of arbitrary code if a malformed image is processed. For the stable distribution (squeeze), this problem has been fixed in version 1.2.44-1+squeeze2. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your libpng packages. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2012:0140-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0140.html Issue date: 2012-02-16 CVE Names: CVE-2011-3026 ===================================================================== 1. Summary: An updated thunderbird package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. A heap-based buffer overflow flaw was found in the way Thunderbird handled PNG (Portable Network Graphics) images. An HTML mail message or remote content containing a specially-crafted PNG image could cause Thunderbird to crash or, possibly, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3026) All Thunderbird users should upgrade to this updated package, which corrects this issue. After installing the update, Thunderbird must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 790737 - CVE-2011-3026 libpng: Heap-buffer-overflow in png_decompress_chunk 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-3.1.18-2.el6_2.src.rpm i386: thunderbird-3.1.18-2.el6_2.i686.rpm thunderbird-debuginfo-3.1.18-2.el6_2.i686.rpm x86_64: thunderbird-3.1.18-2.el6_2.x86_64.rpm thunderbird-debuginfo-3.1.18-2.el6_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-3.1.18-2.el6_2.src.rpm i386: thunderbird-3.1.18-2.el6_2.i686.rpm thunderbird-debuginfo-3.1.18-2.el6_2.i686.rpm ppc64: thunderbird-3.1.18-2.el6_2.ppc64.rpm thunderbird-debuginfo-3.1.18-2.el6_2.ppc64.rpm s390x: thunderbird-3.1.18-2.el6_2.s390x.rpm thunderbird-debuginfo-3.1.18-2.el6_2.s390x.rpm x86_64: thunderbird-3.1.18-2.el6_2.x86_64.rpm thunderbird-debuginfo-3.1.18-2.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-3.1.18-2.el6_2.src.rpm i386: thunderbird-3.1.18-2.el6_2.i686.rpm thunderbird-debuginfo-3.1.18-2.el6_2.i686.rpm x86_64: thunderbird-3.1.18-2.el6_2.x86_64.rpm thunderbird-debuginfo-3.1.18-2.el6_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3026.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFPPVcKXlSAg2UNWIIRAoqMAKCzbPWoUJBFgmE9gRFZWeN/8iP7hACfaa9u 7s0BF/vOs/iyLPCfb4K/ts8= =mBnN -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Autonomy KeyView File Processing Vulnerabilities SECUNIA ADVISORY ID: SA51362 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51362/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51362 RELEASE DATE: 2012-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/51362/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51362/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51362 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to errors when processing unspecified file formats and can be exploited to corrupt memory. The vulnerabilities are reported in versions prior to 10.16. SOLUTION: Update to version 10.16. PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC ORIGINAL ADVISORY: US-CERT VU#849841: http://www.kb.cert.org/vuls/id/849841 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ============================================================================ Ubuntu Security Notice USN-1367-3 February 17, 2012 thunderbird vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: Thunderbird could be made to crash or run programs as your login if it opened a specially crafted file. Original advisory details: Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. CVE-ID CVE-2012-3722 : Will Dormann of the CERT/CC Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious Wi-Fi network may be able to determine networks a device has previously accessed Description: Upon connecting to a Wi-Fi network, iOS may broadcast MAC addresses of previously accessed networks per the DNAv4 protocol. CVE-ID CVE-2011-1944 : Chris Evans of Google Chrome Security Team CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-3919 : Juri Aedla Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker with a privileged network position may cause an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in JavaScriptCore. CVE-ID CVE-2012-0682 : Apple Product Security CVE-2012-0683 : Dave Mandelin of Mozilla CVE-2012-3589 : Dave Mandelin of Mozilla CVE-2012-3590 : Apple Product Security CVE-2012-3591 : Apple Product Security CVE-2012-3592 : Apple Product Security CVE-2012-3678 : Apple Product Security CVE-2012-3679 : Chris Leary of Mozilla Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 are now available and address the following: Apache Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Multiple vulnerabilities in Apache Description: Apache is updated to version 2.2.22 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3368 CVE-2011-3607 CVE-2011-4317 CVE-2012-0021 CVE-2012-0031 CVE-2012-0053 BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A remote attacker may be able to cause a denial of service in systems configured to run BIND as a DNS nameserver Description: A reachable assertion issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4313 BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: A remote attacker may be able to cause a denial of service, data corruption, or obtain sensitive information from process memory in systems configured to run BIND as a DNS nameserver Description: A memory management issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1 on OS X Lion systems, and BIND 9.8.3-P1 on OS X Mountain Lion systems. CVE-ID CVE-2012-1667 CoreText Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A bounds checking issue existed in the handling of text glyphs, which may lead to out of bounds memory reads or writes. This issue was addressed through improved bounds checking. This issue does not affect Mac OS X v10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-3716 : Jesse Ruderman of Mozilla Corporation Data Security Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update adds the involved sub-CA certificate to OS X's list of untrusted certificates. DirectoryService Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: If the DirectoryService Proxy is used, a remote attacker may cause a denial of service or arbitrary code execution Description: A buffer overflow existed in the DirectoryService Proxy. This issue was addressed through improved bounds checking. This issue does not affect OS X Lion and Mountain Lion systems. CVE-ID CVE-2012-0650 : aazubel working with HP's Zero Day Initiative ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libpng's handling of PNG images. These issues were addressed through improved validation of PNG images. These issues do not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3026 : Juri Aedla CVE-2011-3048 ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in libTIFF's handling of TIFF images. This issue was addressed through improved validation of TIFF images. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-1173 : Alexander Gavrun working with HP's Zero Day Initiative Installer Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Remote admins and persons with physical access to the system may obtain account information Description: The fix for CVE-2012-0652 in OS X Lion 10.7.4 prevented user passwords from being recorded in the system log, but did not remove the old log entries. This issue was addressed by deleting log files that contained passwords. This issue does not affect Mac OS X 10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-0652 International Components for Unicode Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in the handling of ICU locale IDs. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4599 Kernel Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A malicious program could bypass sandbox restrictions Description: A logic issue existed in the handling of debug system calls. This may allow a malicious program to gain code execution in other programs with the same user privileges. This issue was addressed by disabling handling of addresses in PT_STEP and PT_CONTINUE. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0643 : iOS Jailbreak Dream Team LoginWindow Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A local user may be able to obtain other user's login passwords Description: A user-installed input method could intercept password keystrokes from Login Window or Screen Saver Unlock. This issue was addressed by preventing user-installed methods from being used when the system is handling login information. CVE-ID CVE-2012-3718 : An anonymous researcher Mail Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing an e-mail message may lead to execution of web plugins Description: An input validation issue existed in Mail's handling of embedded web plugins. This issue was addressed by disabling third- party plug-ins in Mail. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3719 : Will Dormann of the CERT/CC Mobile Accounts Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A user with access to the contents of a mobile account may obtain the account password Description: Creating a mobile account saved a hash of the password in the account, which was used to login when the mobile account was used as an external account. The password hash could be used to determine the user's password. This issue was addressed by creating the password hash only if external accounts are enabled on the system where the mobile account is created. CVE-ID CVE-2012-3720 : Harald Wagener of Google, Inc. PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: Multiple vulnerabilities in PHP Description: >PHP is updated to version 5.3.15 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2012-0831 CVE-2012-1172 CVE-2012-1823 CVE-2012-2143 CVE-2012-2311 CVE-2012-2386 CVE-2012-2688 PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: PHP scripts which use libpng may be vulnerable to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of PNG files. This issue was addressed by updating PHP's copy of libpng to version 1.5.10. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3048 Profile Manager Available for: OS X Lion Server v10.7 to v10.7.4 Impact: An unauthenticated user could enumerate managed devices Description: An authentication issue existed in the Device Management private interface. This issue was addressed by removing the interface. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3721 : Derick Cassidy of XEquals Corporation QuickLook Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted .pict file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .pict files. This issue was addressed through improved validation of .pict files. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the Qualys Vulnerability & Malware Research Labs (VMRL) QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in QuickTime's handling of sean atoms. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft) working with HP's Zero Day Initiative QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access existed in the handling of Sorenson encoded movie files. This issue was addressed through improved memory initialization. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3722 : Will Dormann of the CERT/CC QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0668 : Luigi Auriemma working with HP's Zero Day Initiative Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. The Ruby OpenSSL module disabled the 'empty fragment' countermeasure which prevented these attacks. This issue was addressed by enabling empty fragments. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3389 USB Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Attaching a USB device may lead to an unexpected system termination or arbitrary code execution Description: A memory corruption issue existed in the handling of USB hub descriptors. This issue was addressed through improved handling of the bNbrPorts descriptor field. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3723 : Andy Davis of NGS Secure Note: OS X Mountain Lion v10.8.2 includes the content of Safari 6.0.1. For further details see "About the security content of Safari 6.0.1" at http://http//support.apple.com/kb/HT5502 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ The Software Update utility will present the update that applies to your system configuration. Only one is needed, either OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 or Security Update 2012-004. For OS X Mountain Lion v10.8.1 The download file is named: OSXUpd10.8.2.dmg Its SHA-1 digest is: d6779e1cc748b78af0207499383b1859ffbebe33 For OS X Mountain Lion v10.8 The download file is named: OSXUpdCombo10.8.2.dmg Its SHA-1 digest is: b08f10233d362e39f20b69f91d1d73f5e7b68a2c For OS X Lion v10.7.4 The download file is named: MacOSXUpd10.7.5.dmg Its SHA-1 digest is: e0a9582cce9896938a7a541bd431862d93893532 For OS X Lion v10.7 and v10.7.3 The download file is named: MacOSXUpdCombo10.7.5.dmg Its SHA-1 digest is: f7a26b164fa10dae4fe646e57b01c34a619c8d9b For OS X Lion Server v10.7.4 The download file is named: MacOSXServerUpd10.7.5.dmg Its SHA-1 digest is: a891b03bfb4eecb745c0c39a32f39960fdb6796a For OS X Lion Server v10.7 and v10.7.3 The download file is named: MacOSXServerUpdCombo10.7.5.dmg Its SHA-1 digest is: df6e1748ab0a3c9e05c890be49d514673efd965e For Mac OS X v10.6.8 The download file is named: SecUpd2012-004.dmg Its SHA-1 digest is: 5b136e29a871d41012f0c6ea1362d6210c8b4fb7 For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-004.dmg Its SHA-1 digest is: 9b24496be15078e58a88537700f2f39c112e3b28 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJQWhlbAAoJEPefwLHPlZEwwjwQAKrpQlZh1B2mkSTLxR7QZg6e Qm7SmIZL9sjl5gQkTxoAvOGxJ8uRdYPlJ1IpyU/MbK0GqO53KmFSeKkwCnvLKMaW pc6tiFaQ4zV4LEAwBAFEuqCsMyPEJqKDhYXl2cHQmWfAlrLCyCKfzGLy2mY2UnkE DQC2+ys70DChFv2GzyXlibBXAGMKDygJ5dVKynsi1ceZLYWbUJoGwlUtXPylBpnO QyGWXmEloPbhK6HJbKMNacuDdVcb26pvIeFiivkTSxPVlZ3ns2tAwEyvHrzA9O4n 7rQ6jvfDbguOZmM5sPFvVKBw2GVDBNU+G3T8ouIXhk6Pjhr4in8VFCb8MIMLb8hm 7YYn2z1TzKTNmUuYbwe6ukQvf57cPuW0bAvslbl6PgrzqorlNPU4rDoSvPrJx/RO BOYkcxfirevHDGibfkeqXPjL3h+bVrb1USZpAv+ZOAy0M89SHFcvMtpAhxnoGiV5 w4EyKB+9Yi/CSAk2Ne3Y5kHH7/v3pWV68aJwhVirya7ex3vnJ+M+lRLKSm2BUjL3 +9fykrJBDujFDXoCmK5CN5Wx36DSVZ4VO1h635crotudtcvd+LQ2VHma/Chav5wK q5SSllf4KEownpx6o/qTxpg5tcC4lvgTcsDHlYcNq2s8KTTjmOden8ar4h7M7QD2 xyBfrQfG/dsif6jGHaot =8joH -----END PGP SIGNATURE----- . The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security

Trust: 3.51

sources: NVD: CVE-2011-3026 // CERT/CC: VU#849841 // JVNDB: JVNDB-2012-001496 // BID: 52049 // VULHUB: VHN-50971 // VULMON: CVE-2011-3026 // PACKETSTORM: 109791 // PACKETSTORM: 109833 // PACKETSTORM: 118283 // PACKETSTORM: 109898 // PACKETSTORM: 116836 // PACKETSTORM: 109836 // PACKETSTORM: 116792 // PACKETSTORM: 110096

AFFECTED PRODUCTS

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 2.0

vendor:mozillamodel:firefoxscope:eqversion:10.0.2

Trust: 1.1

vendor:mozillamodel:firefox esrscope:eqversion:10.0.2

Trust: 1.1

vendor:googlemodel:chromescope:ltversion:17.0.963.56

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:6.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:gteversion:10.7.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:ltversion:10.7.5

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.7.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.6.8

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.7.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.6.8

Trust: 1.0

vendor:autonomymodel: - scope: - version: -

Trust: 0.8

vendor:camodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:emcmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:hylandmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:lotusmodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:nuancemodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palisademodel: - scope: - version: -

Trust: 0.8

vendor:proofpointmodel: - scope: - version: -

Trust: 0.8

vendor:symantecmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:trustwavemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:verdasysmodel: - scope: - version: -

Trust: 0.8

vendor:websensemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipad 2 or later )

Trust: 0.8

vendor:necmodel:infoframe imagingcorescope:eqversion:v1.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.8

Trust: 0.8

vendor:mozillamodel:firefoxscope:ltversion:10.x

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7 to v10.7.4

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(iphone 3gs or later )

Trust: 0.8

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.2

Trust: 0.8

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.2

Trust: 0.8

vendor:necmodel:infoframe imagingcorescope:eqversion:v1.2

Trust: 0.8

vendor:red hatmodel:libpngscope: - version: -

Trust: 0.8

vendor:ibmmodel:notesscope:ltversion:8.5.x

Trust: 0.8

vendor:applemodel:tvscope:eqversion:5.1

Trust: 0.8

vendor:applemodel:tvscope:ltversion:( first 2 after generation )

Trust: 0.8

vendor:ibmmodel:notesscope:eqversion:8.5.3 fp4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7 to v10.7.4

Trust: 0.8

vendor:mozillamodel:thunderbirdscope:ltversion:10.x

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.8

Trust: 0.8

vendor:necmodel:infoframe documentskipperscope:eqversion:v4.1

Trust: 0.8

vendor:applemodel:iosscope:eqversion:6

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipod touch first 4 after generation )

Trust: 0.8

vendor:mozillamodel:firefox esrscope:ltversion:10.x

Trust: 0.8

vendor:mozillamodel:thunderbird esrscope:ltversion:10.x

Trust: 0.8

vendor:necmodel:infoframe documentskipperscope:eqversion:v5.1

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:10.0.648.12

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.23

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.13

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.122

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.11

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.32

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.28

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.26

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.10

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:10.0.648.18

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.8

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2.1

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.42

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:neversion:6.3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:libpngmodel:beta01scope:eqversion:1.2.27

Trust: 0.3

vendor:avayamodel:messaging storage server sp8scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefox beta10scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefox beta6scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:lotus notes fix packscope:neversion:8.5.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2.4

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.7.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:ibmmodel:lotus notes fix packscope:eqversion:8.5.33

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:neversion:17.0.963.56

Trust: 0.3

vendor:avayamodel:messaging storage server sp9scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.36

Trust: 0.3

vendor:avayamodel:application serverscope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.4.1

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3.1

Trust: 0.3

vendor:avayamodel:aura experience portal sp2scope:neversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:ibmmodel:lotus notes fix packscope:eqversion:8.5.32

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:mozillamodel:firefox rc3scope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.0.3

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2

Trust: 0.3

vendor:mozillamodel:firefox beta8scope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:neversion:3.6.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.16

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.11

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.14

Trust: 0.3

vendor:libpngmodel:beta01scope:eqversion:1.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence services sp2scope:neversion:6.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:libpngmodel:beta19scope:eqversion:1.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.11

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura application server sip core pb23scope:eqversion:53002.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:3.1.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.02

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:mozillamodel:seamonkey alpha2scope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:lotus notes fp5scope:eqversion:8.5.1

Trust: 0.3

vendor:srwaremodel:ironscope:neversion:18.0.1050.0

Trust: 0.3

vendor:mozillamodel:firefox beta4scope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5.8

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.13

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.26

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.024

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication manager utility services spscope:eqversion:6.16.1.0.9.8

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:eqversion:3.6.29

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.14

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.9

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:neversion:v70001.3.23

Trust: 0.3

vendor:ibmmodel:lotus notesscope:neversion:9.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.5

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.0.7

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.9

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.27

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.9

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.8

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1 for sp2scope:eqversion:11

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.19

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:mozillamodel:firefox rc2scope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.18

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.3

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.20

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:avayamodel:message networking sp4scope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp1scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:mozillamodel:seamonkey rc2scope:eqversion:2.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefox beta1scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.63

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:neversion:9.2

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:10.0.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:informix generoscope:neversion:2.41

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.18

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:13.0.800.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5.5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.3

Trust: 0.3

vendor:avayamodel:message networking sp3scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.6

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.26

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.0

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.6.27

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:avayamodel:voice portal sp3scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.6

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.8.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1.1

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.6

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:neversion:10.0.2

Trust: 0.3

vendor:applemodel:tvscope:neversion:5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.9.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.2

Trust: 0.3

vendor:avayamodel:aura application server sip core pb19scope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.7

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mozillamodel:seamonkey 2.1b2scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.15

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.4.3

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.1.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.23

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.05

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.5

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.45

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.1

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:eqversion:3.6.26

Trust: 0.3

vendor:mozillamodel:firefox beta11scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.10

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:eqversion:3.6.27

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:neversion:v70001.40

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.62

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.10

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.6

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.12

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.34

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.10

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.23

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.13

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:neversion:6.3.2

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:seamonkey alpha1scope:eqversion:2.1

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.4.2

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:libpngmodel:betascope:eqversion:1.5.101

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.03

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.12

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:15.0.900.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:seamonkey alpha3scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:neversion:6.3

Trust: 0.3

vendor:avayamodel:conferencing standard edition sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.2

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefox beta9scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.19

Trust: 0.3

vendor:susemodel:linux enterprise server sp1 for sp2scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:mozillamodel:firefox beta5scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.16

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.5.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.2

Trust: 0.3

vendor:avayamodel:aura application server sip core pb26scope:neversion:53002.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.5

Trust: 0.3

vendor:mozillamodel:seamonkey rc1scope:eqversion:2.0

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:avayamodel:aura application server sip core pb25scope:eqversion:53002.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:2.7.2

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:avayamodel:aura experience portal sp1scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.4

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:informix generoscope:eqversion:2.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefox beta3scope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura system manager sp3scope:eqversion:6.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:mozillamodel:firefox beta7scope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.5

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.02

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.4.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.020

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:libpngmodel:rc1scope:eqversion:1.2.22

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.6

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.4

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:mozillamodel:firefox beta12scope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1.0.9.8

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.1

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.3

vendor:avayamodel:aura application server sip core pb16scope:eqversion:53002.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.01

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:applemodel:iosscope:neversion:6

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.8.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.20

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1 for sp2scope:eqversion:11

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:15

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:lotus notes fp2scope:eqversion:8.5.2

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.35

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:srwaremodel:ironscope:eqversion:11.0.700.3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:message networkingscope:neversion:5.2.5

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 0.3

vendor:moonchildmodel:productions pale moonscope:eqversion:9.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.2

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.2.19

Trust: 0.3

sources: CERT/CC: VU#849841 // BID: 52049 // JVNDB: JVNDB-2012-001496 // CNNVD: CNNVD-201202-339 // NVD: CVE-2011-3026

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3026
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-6277
value: HIGH

Trust: 0.8

NVD: CVE-2011-3026
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201202-339
value: HIGH

Trust: 0.6

VULHUB: VHN-50971
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-3026
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3026
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2012-6277
severity: HIGH
baseScore: 10.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2011-3026
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-50971
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#849841 // VULHUB: VHN-50971 // VULMON: CVE-2011-3026 // JVNDB: JVNDB-2012-001496 // CNNVD: CNNVD-201202-339 // NVD: CVE-2011-3026

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.1

problemtype:CWE-189

Trust: 0.9

sources: VULHUB: VHN-50971 // JVNDB: JVNDB-2012-001496 // NVD: CVE-2011-3026

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 109833 // PACKETSTORM: 110096 // CNNVD: CNNVD-201202-339

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201202-339

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001496

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-50971

PATCH

title:HT5504url:http://support.apple.com/kb/HT5504

Trust: 0.8

title:HT5501url:http://support.apple.com/kb/HT5501

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503

Trust: 0.8

title:HT5501url:http://support.apple.com/kb/HT5501?viewlocale=ja_JP

Trust: 0.8

title:HT5503url:http://support.apple.com/kb/HT5503?viewlocale=ja_JP

Trust: 0.8

title:HT5504url:http://support.apple.com/kb/HT5504?viewlocale=ja_JP

Trust: 0.8

title:Chrome Stable Updateurl:http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:1626697url:http://www-01.ibm.com/support/docview.wss?uid=swg21626697

Trust: 0.8

title:4034373url:http://www-01.ibm.com/support/docview.wss?uid=swg24034373

Trust: 0.8

title:1632104url:http://www-01.ibm.com/support/docview.wss?uid=swg21632104

Trust: 0.8

title:MFSA2012-11url:http://www.mozilla.org/security/announce/2012/mfsa2012-11.html

Trust: 0.8

title:MFSA2012-11url:http://www.mozilla-japan.org/security/announce/2012/mfsa2012-11.html

Trust: 0.8

title:NV12-009url:http://www.nec.co.jp/security-info/secinfo/nv12-009.html

Trust: 0.8

title:RHSA-2012:0317url:https://rhn.redhat.com/errata/RHSA-2012-0317.html

Trust: 0.8

title:Multiple vulnerabilities in libpngurl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_libpng2

Trust: 0.8

title:PictBear 2.04url:http://www.fenrir-inc.com/jp/pictbear/

Trust: 0.8

title:Google Chrome ‘libpng’ Fixes for integer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115290

Trust: 0.6

title:Red Hat: Critical: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120140 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: seamonkey security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120141 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: xulrunner security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120143 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120142 - Security Advisory

Trust: 0.1

title:Red Hat: Important: libpng security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120317 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2011-3026url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=e819467ec1d6eb370af249e8c57643ae

Trust: 0.1

title:Ubuntu Security Notice: xulrunner-1.9.2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1367-4

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1367-3

Trust: 0.1

title:Ubuntu Security Notice: firefox vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1367-2

Trust: 0.1

title:Amazon Linux AMI: ALAS-2012-049url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2012-049

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2012-11url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2012-11

Trust: 0.1

title:Ubuntu Security Notice: libpng vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1367-1

Trust: 0.1

title:Mozilla: libpng integer overflowurl:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=5af0471059f077bf7e3d2b0ef3aef299

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1369-1

Trust: 0.1

title:cve-2011-3026-firefoxurl:https://github.com/argp/cve-2011-3026-firefox

Trust: 0.1

title: - url:https://github.com/CVEDB/PoC-List

Trust: 0.1

sources: VULMON: CVE-2011-3026 // JVNDB: JVNDB-2012-001496 // CNNVD: CNNVD-201202-339

EXTERNAL IDS

db:NVDid:CVE-2011-3026

Trust: 3.7

db:SECUNIAid:49660

Trust: 1.8

db:SECUNIAid:48110

Trust: 1.8

db:SECUNIAid:48016

Trust: 1.8

db:CERT/CCid:VU#523889

Trust: 1.2

db:SECUNIAid:51362

Trust: 1.0

db:CERT/CCid:VU#849841

Trust: 0.9

db:SECTRACKid:1027799

Trust: 0.8

db:BIDid:56610

Trust: 0.8

db:OSVDBid:87619

Trust: 0.8

db:JVNDBid:JVNDB-2012-001496

Trust: 0.8

db:CNNVDid:CNNVD-201202-339

Trust: 0.7

db:BIDid:52049

Trust: 0.4

db:PACKETSTORMid:116792

Trust: 0.2

db:PACKETSTORMid:109836

Trust: 0.2

db:PACKETSTORMid:109898

Trust: 0.2

db:PACKETSTORMid:109833

Trust: 0.2

db:PACKETSTORMid:110263

Trust: 0.2

db:PACKETSTORMid:109791

Trust: 0.2

db:PACKETSTORMid:110096

Trust: 0.2

db:PACKETSTORMid:109838

Trust: 0.1

db:PACKETSTORMid:109835

Trust: 0.1

db:PACKETSTORMid:109900

Trust: 0.1

db:PACKETSTORMid:109897

Trust: 0.1

db:PACKETSTORMid:109967

Trust: 0.1

db:VULHUBid:VHN-50971

Trust: 0.1

db:VULMONid:CVE-2011-3026

Trust: 0.1

db:PACKETSTORMid:118283

Trust: 0.1

db:PACKETSTORMid:116836

Trust: 0.1

sources: CERT/CC: VU#849841 // VULHUB: VHN-50971 // VULMON: CVE-2011-3026 // BID: 52049 // PACKETSTORM: 109791 // PACKETSTORM: 109833 // PACKETSTORM: 118283 // PACKETSTORM: 109898 // PACKETSTORM: 116836 // PACKETSTORM: 110263 // PACKETSTORM: 109836 // PACKETSTORM: 116792 // PACKETSTORM: 110096 // JVNDB: JVNDB-2012-001496 // CNNVD: CNNVD-201202-339 // NVD: CVE-2011-3026

REFERENCES

url:http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00003.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html

Trust: 1.8

url:http://code.google.com/p/chromium/issues/detail?id=112822

Trust: 1.8

url:http://support.apple.com/kb/ht5501

Trust: 1.8

url:http://support.apple.com/kb/ht5503

Trust: 1.8

url:http://security.gentoo.org/glsa/glsa-201206-15.xml

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15032

Trust: 1.8

url:http://secunia.com/advisories/48016

Trust: 1.8

url:http://secunia.com/advisories/48110

Trust: 1.8

url:http://secunia.com/advisories/49660

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00023.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00020.html

Trust: 1.8

url:http://www.kb.cert.org/vuls/id/523889

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3026

Trust: 1.0

url:http://www.autonomy.com/content/products/idol-modules-connectors/index.en.html

Trust: 0.8

url:http://www.autonomy.com/content/technology/idol-functionality-information-connectivity/index.en.html

Trust: 0.8

url:https://customers.autonomy.com

Trust: 0.8

url:http://support.microsoft.com/kb/2458544

Trust: 0.8

url:http://www.youtube.com/watch?v=28_lus_g0u4

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx

Trust: 0.8

url:http://blogs.technet.com/b/srd/archive/2010/12/08/on-the-effectiveness-of-dep-and-aslr.aspx

Trust: 0.8

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20121120_00

Trust: 0.8

url:http://www.securityfocus.com/bid/56610

Trust: 0.8

url:http://securitytracker.com/id/1027799

Trust: 0.8

url:http://www.osvdb.org/show/osvdb/87619

Trust: 0.8

url:http://secunia.com/advisories/51362

Trust: 0.8

url:http://www.autonomy.com/content/news/releases/2004/0803a.en.html

Trust: 0.8

url:http://www.autonomy.com/content/news/releases/2008/0701.en.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-3026

Trust: 0.8

url:http://jvn.jp/cert/jvnvu523889/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu381963/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu624491/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3026

Trust: 0.8

url:http://www.mozilla.org/security/announce/2012/mfsa2012-11.html

Trust: 0.4

url:http://support.apple.com/kb/ht5504

Trust: 0.3

url:http://www.libpng.org/pub/png/libpng.html

Trust: 0.3

url:http://blog.mozilla.com/security/2012/02/17/mozilla-releases-to-address-cve-2011-3026/

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_libpng2

Trust: 0.3

url:http://www.srware.net/forum/viewtopic.php?f=18&t=3521

Trust: 0.3

url:http://www.palemoon.org/releasenotes.shtml

Trust: 0.3

url:http://www.palemoon.org/releasenotes-ng.shtml

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100157180

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100157471

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100160998

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21620982

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004302

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21627992

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21626697

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-3026.html

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3048

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-1173

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-4599

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/190.html

Trust: 0.1

url:https://github.com/argp/cve-2011-3026-firefox

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-0140.html

Trust: 0.1

url:http://secunia.com/advisories/51362/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/849841

Trust: 0.1

url:http://secunia.com/advisories/51362/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51362

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://launchpad.net/bugs/933399

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/3.1.19+build1+nobinonly-0ubuntu0.10.04.1

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1367-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/3.1.19+build1+nobinonly-0ubuntu0.10.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/3.1.19+build1+nobinonly-0ubuntu0.11.04.1

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1367-3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3591

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0682

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2834

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3678

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3919

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0683

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1944

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3679

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3592

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3328

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2821

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-0142.html

Trust: 0.1

url:http://www.php.net

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4313

Trust: 0.1

url:http://http//support.apple.com/kb/ht5502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0031

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0668

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4317

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0831

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0670

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1172

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2311

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0650

Trust: 0.1

url:http://httpd.apache.org/.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3716

Trust: 0.1

sources: CERT/CC: VU#849841 // VULHUB: VHN-50971 // VULMON: CVE-2011-3026 // BID: 52049 // PACKETSTORM: 109791 // PACKETSTORM: 109833 // PACKETSTORM: 118283 // PACKETSTORM: 109898 // PACKETSTORM: 116836 // PACKETSTORM: 110263 // PACKETSTORM: 109836 // PACKETSTORM: 116792 // PACKETSTORM: 110096 // JVNDB: JVNDB-2012-001496 // CNNVD: CNNVD-201202-339 // NVD: CVE-2011-3026

CREDITS

Jueri Aedla

Trust: 0.3

sources: BID: 52049

SOURCES

db:CERT/CCid:VU#849841
db:VULHUBid:VHN-50971
db:VULMONid:CVE-2011-3026
db:BIDid:52049
db:PACKETSTORMid:109791
db:PACKETSTORMid:109833
db:PACKETSTORMid:118283
db:PACKETSTORMid:109898
db:PACKETSTORMid:116836
db:PACKETSTORMid:110263
db:PACKETSTORMid:109836
db:PACKETSTORMid:116792
db:PACKETSTORMid:110096
db:JVNDBid:JVNDB-2012-001496
db:CNNVDid:CNNVD-201202-339
db:NVDid:CVE-2011-3026

LAST UPDATE DATE

2025-06-28T20:10:34.030000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#849841date:2014-01-28T00:00:00
db:VULHUBid:VHN-50971date:2020-04-16T00:00:00
db:VULMONid:CVE-2011-3026date:2020-04-16T00:00:00
db:BIDid:52049date:2015-04-13T21:51:00
db:JVNDBid:JVNDB-2012-001496date:2014-05-30T00:00:00
db:CNNVDid:CNNVD-201202-339date:2020-04-17T00:00:00
db:NVDid:CVE-2011-3026date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#849841date:2012-11-20T00:00:00
db:VULHUBid:VHN-50971date:2012-02-16T00:00:00
db:VULMONid:CVE-2011-3026date:2012-02-16T00:00:00
db:BIDid:52049date:2012-02-15T00:00:00
db:PACKETSTORMid:109791date:2012-02-15T22:46:15
db:PACKETSTORMid:109833date:2012-02-17T02:33:39
db:PACKETSTORMid:118283date:2012-11-23T08:19:25
db:PACKETSTORMid:109898date:2012-02-18T03:05:35
db:PACKETSTORMid:116836date:2012-09-25T06:55:46
db:PACKETSTORMid:110263date:2012-02-28T15:31:05
db:PACKETSTORMid:109836date:2012-02-17T02:34:24
db:PACKETSTORMid:116792date:2012-09-22T06:30:43
db:PACKETSTORMid:110096date:2012-02-23T05:06:20
db:JVNDBid:JVNDB-2012-001496date:2012-02-20T00:00:00
db:CNNVDid:CNNVD-201202-339date:2012-02-17T00:00:00
db:NVDid:CVE-2011-3026date:2012-02-16T20:55:04.083