ID

VAR-201205-0404


CVE

CVE-2012-0670


TITLE

Apple QuickTime Integer overflow vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2012-002435 // CNNVD: CNNVD-201205-266

DESCRIPTION

Integer overflow in Apple QuickTime before 7.7.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted sean atom in a movie file. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within Quicktime.qts when parsing the 'sean' atom. The size specified in the atom's header is added to 0x0C and subsequently allocated. File data is then copied into that buffer along with a series of nulls. If the buffer is undersized, the copy operation can be made to corrupt adjacent memory. An attacker can leverage this vulnerability to execute code under the context of the process. These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. Versions prior to QuickTime 7.7.2 are vulnerable on Windows 7, Vista and XP. This BID is being retired. The following individual records exist to better document the issues: 53584 Apple QuickTime Prior To 7.7.2 '.pict' Files Memory Corruption Vulnerability 53583 Apple QuickTime Prior To 7.7.2 QTVR Files Remote Code Execution Vulnerability 53582 Apple QuickTime Prior To 7.7.2 'sean' Atoms Integer Overflow Vulnerability 53580 Apple QuickTime Prior To 7.7.2 Sorenson Files Buffer Overflow Vulnerability 53579 Apple QuickTime Prior To 7.7.2 RLE Files Buffer Overflow Vulnerability 53578 Apple QuickTime Prior To 7.7.2 File Path Handling Stack Overflow Vulnerability 53577 Apple QuickTime Prior To 7.7.2 QTMovie Objects Stack Overflow Vulnerability 53576 Apple QuickTime Prior To 7.7.2 H.264 Encoded Heap Overflow Vulnerability 53574 Apple QuickTime Prior To 7.7.2 Text Tracks Heap Overflow Vulnerability 53571 Apple QuickTime Prior To 7.7.2 Multiple Stack Overflow Vulnerabilities. Apple QuickTime is a multimedia playback software developed by Apple (Apple). The software is capable of handling multiple sources such as digital video, media segments, and more. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA47447 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47447/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47447 RELEASE DATE: 2012-05-16 DISCUSS ADVISORY: http://secunia.com/advisories/47447/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47447/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47447 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in QuickTime, which can be exploited by malicious people to compromise a user's system. 1) Some errors within the handling of TeXML files can be exploited to cause stack-based buffer overflows. 2) An error within the handling of text tracks can be exploited to cause a heap-based buffer overflow. 3) An error within the handling of H.264 encoded movie files can be exploited to cause a heap-based buffer overflow. 4) An error exists within the parsing of MP4 encoded files. For more information: SA47843 (#26) 5) An off-by-one error can be exploited to cause a single byte buffer overflow. For more information: SA47843 (#28) 6) An error when handling audio samples can be exploited to cause a buffer overflow. For more information: SA49039 (#8) 7) An integer overflow error exists within the handling of MPEG files. For more information: SA49039 (#9) 8) An error within the plugin's handling of QTMovie objects can be exploited to cause a stack-based buffer overflow. 9) An error when parsing the MediaVideo header in videos encoded with the PNG format can be exploited to cause a buffer overflow. 11) A use-after-free error exists when handling JPEG2000 encoded movie files. For more information: SA49039 (#11) 12) An error within the handling of RLE encoded movie files can be exploited to cause a buffer overflow. 13) An error when handling Sorenson encoded movie files can be exploited to cause a buffer overflow. 15) An error within the DllMain module when parsing .pict files can be exploited to corrupt memory. 16) A boundary error in QuickTime.qts when extending a file path based on its short path form can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted file path. Successful exploitation of this vulnerability requires that a user is e.g. 17) An error when handling MPEG files can be exploited to cause a buffer underflow. For more information: SA49039 (#10) The vulnerabilities are reported in versions prior to 7.7.2. SOLUTION: Update to version 7.7.2. PROVIDED AND/OR DISCOVERED BY: 15) Rodrigo Rubira Branco, Qualys Vulnerability & Malware Research Labs (VMRL) 16) Tielei Wang, Georgia Tech Information Security Center via Secunia The vendor credits: 1, 2) Alexander Gavrun via ZDI 3, 12) Luigi Auriemma via ZDI 8) CHkr_D591 via ZDI 10) Alin Rad Pop via ZDI 13) Damian Put via ZDI 14) Tom Gallagher and Paul Bates, Microsoft via ZDI. ORIGINAL ADVISORY: Apple (APPLE-SA-2012-05-15-1): http://lists.apple.com/archives/security-announce/2012/May/msg00005.html Rodrigo Rubira Branco: http://archives.neohapsis.com/archives/fulldisclosure/2012-05/0116.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ZDI-12-153 : Apple QuickTime sean Atom Size Parsing Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-153 August 22, 2012 - -- CVE ID: CVE-2012-0670 - -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P - -- Affected Vendors: Apple - -- Affected Products: Apple QuickTime - -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 12490. - -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT5261 - -- Disclosure Timeline: 2012-01-24 - Vulnerability reported to vendor 2012-08-22 - Coordinated public release of advisory - -- Credit: This vulnerability was discovered by: * Tom Gallagher (Microsoft) & Paul Bates (Microsoft) - -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsBVAwUBUDUEaFVtgMGTo1scAQL/SAf+KSHektXotMcLnoBVBgoSwELmbpz/kbns U6TQUmdFvIFBIgz4M+mu/rqgNOSoEMv3ZTtDET+8WHGkV8Ue7WOF+N11WVBh8E18 Kd37zjq2C8CJjiz6yynpRLDjLXCfwcUm9LHu1f4Z8bw7sDOKlGnVJhWoc7k0OqS5 FHC3stUuQ7Hcq1knDmVmM2v6MAWLzSqC+KwL1UpWZJdc8hYqTUZqoDrENs7CedZX adrPF4UmZfAocY/tcorpu/on4XZhsOn5cEY/k8HUNyCxNGda8+cgir4Cx4SOrqp8 Xy1cYMOoAP+vC4nglhNypc5+bRzrwAZbeqK/lUmTBGL2BXev3ODy+A== =0qk0 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 are now available and address the following: Apache Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Multiple vulnerabilities in Apache Description: Apache is updated to version 2.2.22 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3368 CVE-2011-3607 CVE-2011-4317 CVE-2012-0021 CVE-2012-0031 CVE-2012-0053 BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A remote attacker may be able to cause a denial of service in systems configured to run BIND as a DNS nameserver Description: A reachable assertion issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4313 BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: A remote attacker may be able to cause a denial of service, data corruption, or obtain sensitive information from process memory in systems configured to run BIND as a DNS nameserver Description: A memory management issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1 on OS X Lion systems, and BIND 9.8.3-P1 on OS X Mountain Lion systems. CVE-ID CVE-2012-1667 CoreText Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A bounds checking issue existed in the handling of text glyphs, which may lead to out of bounds memory reads or writes. This issue was addressed through improved bounds checking. This issue does not affect Mac OS X v10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-3716 : Jesse Ruderman of Mozilla Corporation Data Security Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update adds the involved sub-CA certificate to OS X's list of untrusted certificates. DirectoryService Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: If the DirectoryService Proxy is used, a remote attacker may cause a denial of service or arbitrary code execution Description: A buffer overflow existed in the DirectoryService Proxy. This issue was addressed through improved bounds checking. This issue does not affect OS X Lion and Mountain Lion systems. CVE-ID CVE-2012-0650 : aazubel working with HP's Zero Day Initiative ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libpng's handling of PNG images. These issues were addressed through improved validation of PNG images. These issues do not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3026 : Juri Aedla CVE-2011-3048 ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in libTIFF's handling of TIFF images. This issue was addressed through improved validation of TIFF images. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-1173 : Alexander Gavrun working with HP's Zero Day Initiative Installer Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Remote admins and persons with physical access to the system may obtain account information Description: The fix for CVE-2012-0652 in OS X Lion 10.7.4 prevented user passwords from being recorded in the system log, but did not remove the old log entries. This issue was addressed by deleting log files that contained passwords. This issue does not affect Mac OS X 10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-0652 International Components for Unicode Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in the handling of ICU locale IDs. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4599 Kernel Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A malicious program could bypass sandbox restrictions Description: A logic issue existed in the handling of debug system calls. This may allow a malicious program to gain code execution in other programs with the same user privileges. This issue was addressed by disabling handling of addresses in PT_STEP and PT_CONTINUE. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0643 : iOS Jailbreak Dream Team LoginWindow Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A local user may be able to obtain other user's login passwords Description: A user-installed input method could intercept password keystrokes from Login Window or Screen Saver Unlock. This issue was addressed by preventing user-installed methods from being used when the system is handling login information. CVE-ID CVE-2012-3718 : An anonymous researcher Mail Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing an e-mail message may lead to execution of web plugins Description: An input validation issue existed in Mail's handling of embedded web plugins. This issue was addressed by disabling third- party plug-ins in Mail. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3719 : Will Dormann of the CERT/CC Mobile Accounts Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A user with access to the contents of a mobile account may obtain the account password Description: Creating a mobile account saved a hash of the password in the account, which was used to login when the mobile account was used as an external account. The password hash could be used to determine the user's password. This issue was addressed by creating the password hash only if external accounts are enabled on the system where the mobile account is created. CVE-ID CVE-2012-3720 : Harald Wagener of Google, Inc. PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: Multiple vulnerabilities in PHP Description: >PHP is updated to version 5.3.15 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2012-0831 CVE-2012-1172 CVE-2012-1823 CVE-2012-2143 CVE-2012-2311 CVE-2012-2386 CVE-2012-2688 PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: PHP scripts which use libpng may be vulnerable to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of PNG files. This issue was addressed by updating PHP's copy of libpng to version 1.5.10. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3048 Profile Manager Available for: OS X Lion Server v10.7 to v10.7.4 Impact: An unauthenticated user could enumerate managed devices Description: An authentication issue existed in the Device Management private interface. This issue was addressed by removing the interface. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3721 : Derick Cassidy of XEquals Corporation QuickLook Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted .pict file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .pict files. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the Qualys Vulnerability & Malware Research Labs (VMRL) QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in QuickTime's handling of sean atoms. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft) working with HP's Zero Day Initiative QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access existed in the handling of Sorenson encoded movie files. This issue was addressed through improved memory initialization. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3722 : Will Dormann of the CERT/CC QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0668 : Luigi Auriemma working with HP's Zero Day Initiative Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. The Ruby OpenSSL module disabled the 'empty fragment' countermeasure which prevented these attacks. This issue was addressed by enabling empty fragments. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3389 USB Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Attaching a USB device may lead to an unexpected system termination or arbitrary code execution Description: A memory corruption issue existed in the handling of USB hub descriptors. This issue was addressed through improved handling of the bNbrPorts descriptor field. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3723 : Andy Davis of NGS Secure Note: OS X Mountain Lion v10.8.2 includes the content of Safari 6.0.1. For further details see "About the security content of Safari 6.0.1" at http://http//support.apple.com/kb/HT5502 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ The Software Update utility will present the update that applies to your system configuration. Only one is needed, either OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 or Security Update 2012-004. For OS X Mountain Lion v10.8.1 The download file is named: OSXUpd10.8.2.dmg Its SHA-1 digest is: d6779e1cc748b78af0207499383b1859ffbebe33 For OS X Mountain Lion v10.8 The download file is named: OSXUpdCombo10.8.2.dmg Its SHA-1 digest is: b08f10233d362e39f20b69f91d1d73f5e7b68a2c For OS X Lion v10.7.4 The download file is named: MacOSXUpd10.7.5.dmg Its SHA-1 digest is: e0a9582cce9896938a7a541bd431862d93893532 For OS X Lion v10.7 and v10.7.3 The download file is named: MacOSXUpdCombo10.7.5.dmg Its SHA-1 digest is: f7a26b164fa10dae4fe646e57b01c34a619c8d9b For OS X Lion Server v10.7.4 The download file is named: MacOSXServerUpd10.7.5.dmg Its SHA-1 digest is: a891b03bfb4eecb745c0c39a32f39960fdb6796a For OS X Lion Server v10.7 and v10.7.3 The download file is named: MacOSXServerUpdCombo10.7.5.dmg Its SHA-1 digest is: df6e1748ab0a3c9e05c890be49d514673efd965e For Mac OS X v10.6.8 The download file is named: SecUpd2012-004.dmg Its SHA-1 digest is: 5b136e29a871d41012f0c6ea1362d6210c8b4fb7 For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-004.dmg Its SHA-1 digest is: 9b24496be15078e58a88537700f2f39c112e3b28 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJQWhlbAAoJEPefwLHPlZEwwjwQAKrpQlZh1B2mkSTLxR7QZg6e Qm7SmIZL9sjl5gQkTxoAvOGxJ8uRdYPlJ1IpyU/MbK0GqO53KmFSeKkwCnvLKMaW pc6tiFaQ4zV4LEAwBAFEuqCsMyPEJqKDhYXl2cHQmWfAlrLCyCKfzGLy2mY2UnkE DQC2+ys70DChFv2GzyXlibBXAGMKDygJ5dVKynsi1ceZLYWbUJoGwlUtXPylBpnO QyGWXmEloPbhK6HJbKMNacuDdVcb26pvIeFiivkTSxPVlZ3ns2tAwEyvHrzA9O4n 7rQ6jvfDbguOZmM5sPFvVKBw2GVDBNU+G3T8ouIXhk6Pjhr4in8VFCb8MIMLb8hm 7YYn2z1TzKTNmUuYbwe6ukQvf57cPuW0bAvslbl6PgrzqorlNPU4rDoSvPrJx/RO BOYkcxfirevHDGibfkeqXPjL3h+bVrb1USZpAv+ZOAy0M89SHFcvMtpAhxnoGiV5 w4EyKB+9Yi/CSAk2Ne3Y5kHH7/v3pWV68aJwhVirya7ex3vnJ+M+lRLKSm2BUjL3 +9fykrJBDujFDXoCmK5CN5Wx36DSVZ4VO1h635crotudtcvd+LQ2VHma/Chav5wK q5SSllf4KEownpx6o/qTxpg5tcC4lvgTcsDHlYcNq2s8KTTjmOden8ar4h7M7QD2 xyBfrQfG/dsif6jGHaot =8joH -----END PGP SIGNATURE-----

Trust: 3.24

sources: NVD: CVE-2012-0670 // JVNDB: JVNDB-2012-002435 // ZDI: ZDI-12-153 // BID: 53582 // BID: 53547 // VULHUB: VHN-53951 // PACKETSTORM: 112816 // PACKETSTORM: 112789 // PACKETSTORM: 115805 // PACKETSTORM: 116792

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.9

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.7

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.68.75.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.64.17.73

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.62.14.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.66.71.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.67.75.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.60.92.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.65.17.80

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.8

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.69.80.9

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.3.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7 to v10.7.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7 to v10.7.4

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.7.2

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.7.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.8

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.7

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.6(1671)

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.6

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.7

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.64.17.73

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.9

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.7.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.7.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

sources: ZDI: ZDI-12-153 // BID: 53582 // BID: 53547 // JVNDB: JVNDB-2012-002435 // CNNVD: CNNVD-201205-266 // NVD: CVE-2012-0670

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0670
value: HIGH

Trust: 1.0

NVD: CVE-2012-0670
value: HIGH

Trust: 0.8

ZDI: CVE-2012-0670
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201205-266
value: CRITICAL

Trust: 0.6

VULHUB: VHN-53951
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0670
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2012-0670
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-53951
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-12-153 // VULHUB: VHN-53951 // JVNDB: JVNDB-2012-002435 // CNNVD: CNNVD-201205-266 // NVD: CVE-2012-0670

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-53951 // JVNDB: JVNDB-2012-002435 // NVD: CVE-2012-0670

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 115805 // CNNVD: CNNVD-201205-266

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 53582 // BID: 53547

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002435

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-53951

PATCH

title:HT5261url:http://support.apple.com/kb/HT5261

Trust: 1.5

title:APPLE-SA-2012-09-19-2url:http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html

Trust: 0.8

title:APPLE-SA-2012-05-15-1url:http://lists.apple.com/archives/security-announce/2012/May/msg00005.html

Trust: 0.8

title:HT5501url:http://support.apple.com/kb/HT5501

Trust: 0.8

title:HT5501url:http://support.apple.com/kb/HT5501?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-12-153 // JVNDB: JVNDB-2012-002435

EXTERNAL IDS

db:NVDid:CVE-2012-0670

Trust: 3.8

db:BIDid:53582

Trust: 1.4

db:SECTRACKid:1027065

Trust: 1.1

db:BIDid:53547

Trust: 0.9

db:ZDIid:ZDI-12-153

Trust: 0.8

db:JVNDBid:JVNDB-2012-002435

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1495

Trust: 0.7

db:CNNVDid:CNNVD-201205-266

Trust: 0.7

db:SECUNIAid:47447

Trust: 0.7

db:APPLEid:APPLE-SA-2012-05-15-1

Trust: 0.6

db:NSFOCUSid:19637

Trust: 0.6

db:NSFOCUSid:19656

Trust: 0.6

db:PACKETSTORMid:115805

Trust: 0.2

db:VULHUBid:VHN-53951

Trust: 0.1

db:PACKETSTORMid:112816

Trust: 0.1

db:PACKETSTORMid:112789

Trust: 0.1

db:PACKETSTORMid:116792

Trust: 0.1

sources: ZDI: ZDI-12-153 // VULHUB: VHN-53951 // BID: 53582 // BID: 53547 // JVNDB: JVNDB-2012-002435 // PACKETSTORM: 112816 // PACKETSTORM: 112789 // PACKETSTORM: 115805 // PACKETSTORM: 116792 // CNNVD: CNNVD-201205-266 // NVD: CVE-2012-0670

REFERENCES

url:http://support.apple.com/kb/ht5261

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2012/may/msg00005.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html

Trust: 1.1

url:http://www.securityfocus.com/bid/53582

Trust: 1.1

url:http://support.apple.com/kb/ht5501

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16111

Trust: 1.1

url:http://www.securitytracker.com/id?1027065

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0670

Trust: 0.8

url:http://jvn.jp/cert/jvnvu466700

Trust: 0.8

url:http://jvn.jp/cert/jvnvu381963/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0670

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.6

url:http://secunia.com/advisories/47447

Trust: 0.6

url:http://www.securityfocus.com/bid/53547

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19656

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19637

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2012-0670

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0668

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0671

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47447

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/47447/#comments

Trust: 0.1

url:http://secunia.com/advisories/47447/

Trust: 0.1

url:http://archives.neohapsis.com/archives/fulldisclosure/2012-05/0116.html

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0658

Trust: 0.1

url:http://www.apple.com/quicktime/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0661

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3460

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0666

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0669

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3458

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0265

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0664

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-12-153

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://www.php.net

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4313

Trust: 0.1

url:http://http//support.apple.com/kb/ht5502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3048

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0031

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4317

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0831

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1173

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1172

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2311

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0650

Trust: 0.1

url:http://httpd.apache.org/.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3026

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3716

Trust: 0.1

sources: ZDI: ZDI-12-153 // VULHUB: VHN-53951 // BID: 53582 // BID: 53547 // JVNDB: JVNDB-2012-002435 // PACKETSTORM: 112816 // PACKETSTORM: 112789 // PACKETSTORM: 115805 // PACKETSTORM: 116792 // CNNVD: CNNVD-201205-266 // NVD: CVE-2012-0670

CREDITS

Tom Gallagher (Microsoft) & Paul Bates (Microsoft)

Trust: 0.7

sources: ZDI: ZDI-12-153

SOURCES

db:ZDIid:ZDI-12-153
db:VULHUBid:VHN-53951
db:BIDid:53582
db:BIDid:53547
db:JVNDBid:JVNDB-2012-002435
db:PACKETSTORMid:112816
db:PACKETSTORMid:112789
db:PACKETSTORMid:115805
db:PACKETSTORMid:116792
db:CNNVDid:CNNVD-201205-266
db:NVDid:CVE-2012-0670

LAST UPDATE DATE

2025-04-11T20:35:30.716000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-12-153date:2012-08-22T00:00:00
db:VULHUBid:VHN-53951date:2017-09-19T00:00:00
db:BIDid:53582date:2012-09-20T17:10:00
db:BIDid:53547date:2012-05-16T23:00:00
db:JVNDBid:JVNDB-2012-002435date:2013-12-02T00:00:00
db:CNNVDid:CNNVD-201205-266date:2012-05-17T00:00:00
db:NVDid:CVE-2012-0670date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-12-153date:2012-08-22T00:00:00
db:VULHUBid:VHN-53951date:2012-05-16T00:00:00
db:BIDid:53582date:2012-05-15T00:00:00
db:BIDid:53547date:2012-05-15T00:00:00
db:JVNDBid:JVNDB-2012-002435date:2012-05-17T00:00:00
db:PACKETSTORMid:112816date:2012-05-17T11:19:13
db:PACKETSTORMid:112789date:2012-05-16T23:16:27
db:PACKETSTORMid:115805date:2012-08-23T02:40:05
db:PACKETSTORMid:116792date:2012-09-22T06:30:43
db:CNNVDid:CNNVD-201205-266date:2012-05-17T00:00:00
db:NVDid:CVE-2012-0670date:2012-05-16T10:12:58.163