ID

VAR-201303-0132


CVE

CVE-2013-0978


TITLE

Apple iOS and Apple TV In the kernel ASLR Vulnerabilities that circumvent protection mechanisms

Trust: 0.8

sources: JVNDB: JVNDB-2013-001936

DESCRIPTION

The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a local information-disclosure vulnerability. Local attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. Through specially crafted code, a local attacker can exploit this vulnerability to bypass the ASLR protection mechanism. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-03-19-1 iOS 6.1.3 iOS 6.1.3 is now available and addresses the following: dyld Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to execute unsigned code Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed by refusing to load an executable with overlapping segments. CVE-ID CVE-2013-0977 : evad3rs Kernel Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to determine the address of structures in the kernel Description: An information disclosure issue existed in the ARM prefetch abort handler. This issue was addressed by panicking if the prefetch abort handler is not being called from an abort context. CVE-ID CVE-2013-0978 : evad3rs Lockdown Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to change permissions on arbitrary files Description: When restoring from backup, lockdownd changed permissions on certain files even if the path to the file included a symbolic link. This issue was addressed by not changing permissions on any file with a symlink in its path. CVE-ID CVE-2013-0979 : evad3rs Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to bypass the screen lock Description: A logic issue existed in the handling of emergency calls from the lock screen. This issue was addressed through improved lock state management. CVE-ID CVE-2013-0980 : Christopher Heffley of theMedium.ca, videosdebarraquito USB Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to execute arbitrary code in the kernel Description: The IOUSBDeviceFamily driver used pipe object pointers that came from userspace. This issue was addressed by performing additional validation of pipe object pointers. CVE-ID CVE-2013-0981 : evad3rs WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: An invalid cast issue existed in the handling of SVG files. This issue was addressed through improved type checking. CVE-ID CVE-2013-0912 : Nils and Jon from MWR Labs working with HP TippingPoint's Zero Day Initiative Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. The version after applying this update will be "6.1.3". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJRR36/AAoJEPefwLHPlZEwj+8P/j2CxTtGz790dpfS5+3k02AV JmdOZjAxzEtsc/j5XfpyGdvOBAfTEK+llt/tQ6C3dK+KlB9otDwvgz3K0DFls1fM p0OVw4E6Ao2qfDG02eqGdPldYMejTxlH1AGs4mW6ZdfM2mAZLn+Bmm3dCkcJ2PGn s9bYZBQdnQySkd1/l6lc2dj5zpjmsWMtr0dLVyiq39jDA1E5oA+iAEJ45BT3mxeA SKn44+xhpVQATAz4H5tYaxQAFt9hmJbzkvH8VoMLzoJNSrodBjB9WPtLPX95P/eg 88F2RshnpjrKnlWcbzzyEQWt7j2hxtjvJufGxdtOQXLIUp4wGlqQeTmCso/cqQPV UlLUbbRNr4et9wS2EWlYymywcIwtYlFlgslNiV9zzLWKo6Hv79oSr3KAYaI1kn48 v1FS8OvZswQrsUwCb73WMVdh0RoEMPYPptkzB76ivk/KCcj+CUqC+fFm84JDTM4D eS+dLkA+p2mdhYNCPkmbPTbSdSfOK4rKU90RHCvxq04b+8KM/iHA7xQ0rpibK6ba Ya47zOgnRRzvFghYazasvC5LSPVsQolz+D5wWOMyL5iVWDXYhzFXJ2H45ZgmO73k +tcKHXKCSN9IdYmtEG/nOLiKCU6V7W9Sk42Sl6Eyb3cKhKgPtsaWUybHiDi8XjV8 oiKBfq9i2nsbqLTdlCIO =f4N8 -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-0978 // JVNDB: JVNDB-2013-001936 // BID: 58590 // VULHUB: VHN-60980 // PACKETSTORM: 120881 // PACKETSTORM: 120882

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:5.1.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:5.0.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.4.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.2.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.4.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.4.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.1.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:5.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.2.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.4.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.4.4

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:2.1.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:4.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:applemodel:tvosscope:lteversion:5.2.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:tvscope:ltversion:5.2.1 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1.3 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1.3 (iphone 3gs or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:6.1.3 (ipod touch first 4 after generation )

Trust: 0.8

vendor:applemodel:tvscope:eqversion:4.2.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:3.0.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:5.0.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:5.0.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:4.1.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:4.2.2

Trust: 0.6

vendor:applemodel:tvscope:eqversion:3.0.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:3.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

sources: BID: 58590 // JVNDB: JVNDB-2013-001936 // CNNVD: CNNVD-201303-394 // NVD: CVE-2013-0978

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0978
value: LOW

Trust: 1.0

NVD: CVE-2013-0978
value: LOW

Trust: 0.8

CNNVD: CNNVD-201303-394
value: LOW

Trust: 0.6

VULHUB: VHN-60980
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2013-0978
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-60980
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-60980 // JVNDB: JVNDB-2013-001936 // CNNVD: CNNVD-201303-394 // NVD: CVE-2013-0978

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-60980 // JVNDB: JVNDB-2013-001936 // NVD: CVE-2013-0978

THREAT TYPE

local

Trust: 0.9

sources: BID: 58590 // CNNVD: CNNVD-201303-394

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201303-394

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001936

PATCH

title:APPLE-SA-2013-03-19-1url:http://lists.apple.com/archives/security-announce/2013/Mar/msg00004.html

Trust: 0.8

title:APPLE-SA-2013-03-19-2url:http://lists.apple.com/archives/security-announce/2013/Mar/msg00005.html

Trust: 0.8

title:HT5704url:http://support.apple.com/kb/HT5704

Trust: 0.8

title:HT5702url:http://support.apple.com/kb/HT5702

Trust: 0.8

title:HT5704url:http://support.apple.com/kb/HT5704?viewlocale=ja_JP

Trust: 0.8

title:HT5702url:http://support.apple.com/kb/HT5702?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-001936

EXTERNAL IDS

db:NVDid:CVE-2013-0978

Trust: 3.0

db:JVNid:JVNVU98342319

Trust: 0.8

db:JVNDBid:JVNDB-2013-001936

Trust: 0.8

db:CNNVDid:CNNVD-201303-394

Trust: 0.7

db:BIDid:58590

Trust: 0.4

db:VULHUBid:VHN-60980

Trust: 0.1

db:PACKETSTORMid:120881

Trust: 0.1

db:PACKETSTORMid:120882

Trust: 0.1

sources: VULHUB: VHN-60980 // BID: 58590 // JVNDB: JVNDB-2013-001936 // PACKETSTORM: 120881 // PACKETSTORM: 120882 // CNNVD: CNNVD-201303-394 // NVD: CVE-2013-0978

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/mar/msg00004.html

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2013/mar/msg00005.html

Trust: 2.0

url:http://support.apple.com/kb/ht5702

Trust: 1.7

url:http://support.apple.com/kb/ht5704

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0978

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98342319/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0978

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0977

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0978

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0981

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0980

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0912

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0979

Trust: 0.1

sources: VULHUB: VHN-60980 // BID: 58590 // JVNDB: JVNDB-2013-001936 // PACKETSTORM: 120881 // PACKETSTORM: 120882 // CNNVD: CNNVD-201303-394 // NVD: CVE-2013-0978

CREDITS

evad3rs

Trust: 0.9

sources: BID: 58590 // CNNVD: CNNVD-201303-394

SOURCES

db:VULHUBid:VHN-60980
db:BIDid:58590
db:JVNDBid:JVNDB-2013-001936
db:PACKETSTORMid:120881
db:PACKETSTORMid:120882
db:CNNVDid:CNNVD-201303-394
db:NVDid:CVE-2013-0978

LAST UPDATE DATE

2025-04-11T21:51:01.493000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-60980date:2019-09-26T00:00:00
db:BIDid:58590date:2013-03-19T00:00:00
db:JVNDBid:JVNDB-2013-001936date:2013-03-22T00:00:00
db:CNNVDid:CNNVD-201303-394date:2019-03-13T00:00:00
db:NVDid:CVE-2013-0978date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-60980date:2013-03-20T00:00:00
db:BIDid:58590date:2013-03-19T00:00:00
db:JVNDBid:JVNDB-2013-001936date:2013-03-22T00:00:00
db:PACKETSTORMid:120881date:2013-03-20T22:22:22
db:PACKETSTORMid:120882date:2013-03-20T23:33:33
db:CNNVDid:CNNVD-201303-394date:2013-03-20T00:00:00
db:NVDid:CVE-2013-0978date:2013-03-20T14:55:04.157