Action not permitted
Modal body text goes here.
cve-2009-0153
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:24:17.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3639" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "RHSA-2009:1122", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "name": "macos-icu-security-bypass(50488)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34974", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34974" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "name": "FEDORA-2009-6121", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35379" }, { "name": "34926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34926" }, { "name": "35498", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35498" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "35584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35584" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "name": "35436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35436" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "FEDORA-2009-6273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "name": "oval:org.mitre.oval:def:11366", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3639" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "RHSA-2009:1122", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35074" }, { "name": "macos-icu-security-bypass(50488)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34974", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34974" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "name": "FEDORA-2009-6121", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35379" }, { "name": "34926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34926" }, { "name": "35498", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35498" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "35584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35584" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "name": "35436", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35436" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "FEDORA-2009-6273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "name": "oval:org.mitre.oval:def:11366", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3639" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "RHSA-2009:1122", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "macos-icu-security-bypass(50488)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34974", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34974" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://bugs.icu-project.org/trac/ticket/5691", "refsource": "CONFIRM", "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "name": "FEDORA-2009-6121", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "name": "35379", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35379" }, { "name": "34926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34926" }, { "name": "35498", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35498" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "35584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35584" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=503071", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "name": "35436", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35436" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3613" }, { "name": "FEDORA-2009-6273", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "name": "oval:org.mitre.oval:def:11366", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0153", "datePublished": "2009-05-13T15:14:00", "dateReserved": "2009-01-16T00:00:00", "dateUpdated": "2024-08-07T04:24:17.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-0153\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-05-13T15:30:00.360\",\"lastModified\":\"2017-09-29T01:33:39.340\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.\"},{\"lang\":\"es\",\"value\":\"International Components para Unicode (ICU) en Apple Mac OS X v10.5 antes de v10.5.7 no maneja correctamente las secuencias de bytes no v\u00e1lidos durante la conversi\u00f3n a Unicode, lo cual podr\u00eda permitir a atacantes remotos realizar ataques de secuencias de comandos en sitios cruzados (XSS).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC90AA12-DD17-4607-90CB-E342E83F20BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855288F1-0242-4951-AB3F-B7AF13E21CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10082781-B93E-4B84-94F2-FA9749B4D92B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB077A2-927B-43AF-BFD5-0E78648C9394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7817232-BE3E-4655-8282-A979E5D40D3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E8D614-E1EE-42F1-9E55-EA54FB500621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73BED9E-29FB-4965-B38F-013FFE5A9170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B7DEC3-1C0B-4D13-98CD-CB7FAE7933B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7723A9E8-1DE2-4C7D-81E6-4F79DCB09324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C147E866-B80F-4FFA-BBE8-19E84A46DB1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E\"}]}]}],\"references\":[{\"url\":\"http://bugs.icu-project.org/trac/ticket/5691\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35436\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35498\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35584\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1122.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34926\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34974\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=503071\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50488\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html\",\"source\":\"cve@mitre.org\"}]}}" } }
gsd-2009-0153
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2009-0153", "description": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GSD-2009-0153", "references": [ "https://www.suse.com/security/cve/CVE-2009-0153.html", "https://www.debian.org/security/2009/dsa-1889", "https://access.redhat.com/errata/RHSA-2009:1122", "https://linux.oracle.com/cve/CVE-2009-0153.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-0153" ], "details": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GSD-2009-0153", "modified": "2023-12-13T01:19:44.860012Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3639" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "RHSA-2009:1122", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "macos-icu-security-bypass(50488)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34974", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34974" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://bugs.icu-project.org/trac/ticket/5691", "refsource": "CONFIRM", "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "name": "FEDORA-2009-6121", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "name": "35379", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35379" }, { "name": "34926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34926" }, { "name": "35498", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35498" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "35584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35584" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=503071", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "name": "35436", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35436" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3613" }, { "name": "FEDORA-2009-6273", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "name": "oval:org.mitre.oval:def:11366", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0153" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "35074", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35074" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "TA09-133A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "34926", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/34926" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3613" }, { "name": "35379", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35379" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34974", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/34974" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=503071", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "name": "FEDORA-2009-6273", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "name": "35498", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35498" }, { "name": "35436", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35436" }, { "name": "FEDORA-2009-6121", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3639" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "http://bugs.icu-project.org/trac/ticket/5691", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "name": "35584", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35584" }, { "name": "RHSA-2009:1122", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "name": "macos-icu-security-bypass(50488)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "name": "oval:org.mitre.oval:def:11366", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2017-09-29T01:33Z", "publishedDate": "2009-05-13T15:30Z" } } }
rhsa-2009_1122
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated icu packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The International Components for Unicode (ICU) library provides robust and\nfull-featured Unicode services.\n\nA flaw was found in the way ICU processed certain, invalid byte sequences\nduring Unicode conversion. If an application used ICU to decode malformed,\nmultibyte character data, it may have been possible to bypass certain\ncontent protection mechanisms, or display information in a manner\nmisleading to the user. (CVE-2009-0153)\n\nAll users of icu should upgrade to these updated packages, which contain\nbackported patches to resolve this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1122", "url": "https://access.redhat.com/errata/RHSA-2009:1122" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "503071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1122.json" } ], "title": "Red Hat Security Advisory: icu security update", "tracking": { "current_release_date": "2024-11-22T02:51:10+00:00", "generator": { "date": "2024-11-22T02:51:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1122", "initial_release_date": "2009-06-25T14:06:00+00:00", "revision_history": [ { "date": "2009-06-25T14:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-25T10:06:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:51:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.x86_64", "product": { "name": "libicu-devel-0:3.6-5.11.4.x86_64", "product_id": "libicu-devel-0:3.6-5.11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=x86_64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.x86_64", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.x86_64", "product_id": "icu-debuginfo-0:3.6-5.11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.4.x86_64", "product": { "name": "libicu-doc-0:3.6-5.11.4.x86_64", "product_id": "libicu-doc-0:3.6-5.11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.4?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.4.x86_64", "product": { "name": "libicu-0:3.6-5.11.4.x86_64", "product_id": "libicu-0:3.6-5.11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=x86_64" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.4.x86_64", "product": { "name": "icu-0:3.6-5.11.4.x86_64", "product_id": "icu-0:3.6-5.11.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.i386", "product": { "name": "libicu-devel-0:3.6-5.11.4.i386", "product_id": "libicu-devel-0:3.6-5.11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=i386" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.i386", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.i386", "product_id": "icu-debuginfo-0:3.6-5.11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=i386" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.4.i386", "product": { "name": "libicu-0:3.6-5.11.4.i386", "product_id": "libicu-0:3.6-5.11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=i386" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.4.i386", "product": { "name": "libicu-doc-0:3.6-5.11.4.i386", "product_id": "libicu-doc-0:3.6-5.11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.4?arch=i386" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.4.i386", "product": { "name": "icu-0:3.6-5.11.4.i386", "product_id": "icu-0:3.6-5.11.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.4.src", "product": { "name": "icu-0:3.6-5.11.4.src", "product_id": "icu-0:3.6-5.11.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.4.ia64", "product": { "name": "libicu-doc-0:3.6-5.11.4.ia64", "product_id": "libicu-doc-0:3.6-5.11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.4?arch=ia64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.4.ia64", "product": { "name": "libicu-0:3.6-5.11.4.ia64", "product_id": "libicu-0:3.6-5.11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=ia64" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.ia64", "product": { "name": "libicu-devel-0:3.6-5.11.4.ia64", "product_id": "libicu-devel-0:3.6-5.11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=ia64" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.4.ia64", "product": { "name": "icu-0:3.6-5.11.4.ia64", "product_id": "icu-0:3.6-5.11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=ia64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.ia64", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.ia64", "product_id": "icu-debuginfo-0:3.6-5.11.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.4.ppc", "product": { "name": "libicu-doc-0:3.6-5.11.4.ppc", "product_id": "libicu-doc-0:3.6-5.11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.4?arch=ppc" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.4.ppc", "product": { "name": "libicu-0:3.6-5.11.4.ppc", "product_id": "libicu-0:3.6-5.11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=ppc" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.ppc", "product": { "name": "libicu-devel-0:3.6-5.11.4.ppc", "product_id": "libicu-devel-0:3.6-5.11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=ppc" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.4.ppc", "product": { "name": "icu-0:3.6-5.11.4.ppc", "product_id": "icu-0:3.6-5.11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=ppc" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.ppc", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc", "product_id": "icu-debuginfo-0:3.6-5.11.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libicu-0:3.6-5.11.4.ppc64", "product": { "name": "libicu-0:3.6-5.11.4.ppc64", "product_id": "libicu-0:3.6-5.11.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=ppc64" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.ppc64", "product": { "name": "libicu-devel-0:3.6-5.11.4.ppc64", "product_id": "libicu-devel-0:3.6-5.11.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=ppc64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.ppc64", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc64", "product_id": "icu-debuginfo-0:3.6-5.11.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.4.s390x", "product": { "name": "libicu-doc-0:3.6-5.11.4.s390x", "product_id": "libicu-doc-0:3.6-5.11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.4?arch=s390x" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.4.s390x", "product": { "name": "libicu-0:3.6-5.11.4.s390x", "product_id": "libicu-0:3.6-5.11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=s390x" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.s390x", "product": { "name": "libicu-devel-0:3.6-5.11.4.s390x", "product_id": "libicu-devel-0:3.6-5.11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=s390x" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.4.s390x", "product": { "name": "icu-0:3.6-5.11.4.s390x", "product_id": "icu-0:3.6-5.11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.4?arch=s390x" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.s390x", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.s390x", "product_id": "icu-debuginfo-0:3.6-5.11.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libicu-0:3.6-5.11.4.s390", "product": { "name": "libicu-0:3.6-5.11.4.s390", "product_id": "libicu-0:3.6-5.11.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.4?arch=s390" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.4.s390", "product": { "name": "libicu-devel-0:3.6-5.11.4.s390", "product_id": "libicu-devel-0:3.6-5.11.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.4?arch=s390" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.4.s390", "product": { "name": "icu-debuginfo-0:3.6-5.11.4.s390", "product_id": "icu-debuginfo-0:3.6-5.11.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.i386" }, "product_reference": "icu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.ia64" }, "product_reference": "icu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.ppc" }, "product_reference": "icu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.s390x" }, "product_reference": "icu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.src" }, "product_reference": "icu-0:3.6-5.11.4.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.i386" }, "product_reference": "libicu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.s390" }, "product_reference": "libicu-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.4.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.i386" }, "product_reference": "icu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.ia64" }, "product_reference": "icu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.ppc" }, "product_reference": "icu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.s390x" }, "product_reference": "icu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.src" }, "product_reference": "icu-0:3.6-5.11.4.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.i386" }, "product_reference": "libicu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.s390" }, "product_reference": "libicu-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.4.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.i386" }, "product_reference": "icu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.ia64" }, "product_reference": "icu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.ppc" }, "product_reference": "icu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.s390x" }, "product_reference": "icu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.src" }, "product_reference": "icu-0:3.6-5.11.4.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.4.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.i386" }, "product_reference": "libicu-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.s390" }, "product_reference": "libicu-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.4.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.4.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.4.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.4.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.4.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.4.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.4.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.4.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.4.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0153", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "503071" } ], "notes": [ { "category": "description", "text": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "icu: XSS vulnerability due to improper invalid byte sequence handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:icu-0:3.6-5.11.4.i386", "5Client-Workstation:icu-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-0:3.6-5.11.4.src", "5Client-Workstation:icu-0:3.6-5.11.4.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.x86_64", "5Client:icu-0:3.6-5.11.4.i386", "5Client:icu-0:3.6-5.11.4.ia64", "5Client:icu-0:3.6-5.11.4.ppc", "5Client:icu-0:3.6-5.11.4.s390x", "5Client:icu-0:3.6-5.11.4.src", "5Client:icu-0:3.6-5.11.4.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.4.i386", "5Client:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.4.s390", "5Client:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client:libicu-0:3.6-5.11.4.i386", "5Client:libicu-0:3.6-5.11.4.ia64", "5Client:libicu-0:3.6-5.11.4.ppc", "5Client:libicu-0:3.6-5.11.4.ppc64", "5Client:libicu-0:3.6-5.11.4.s390", "5Client:libicu-0:3.6-5.11.4.s390x", "5Client:libicu-0:3.6-5.11.4.x86_64", "5Client:libicu-devel-0:3.6-5.11.4.i386", "5Client:libicu-devel-0:3.6-5.11.4.ia64", "5Client:libicu-devel-0:3.6-5.11.4.ppc", "5Client:libicu-devel-0:3.6-5.11.4.ppc64", "5Client:libicu-devel-0:3.6-5.11.4.s390", "5Client:libicu-devel-0:3.6-5.11.4.s390x", "5Client:libicu-devel-0:3.6-5.11.4.x86_64", "5Client:libicu-doc-0:3.6-5.11.4.i386", "5Client:libicu-doc-0:3.6-5.11.4.ia64", "5Client:libicu-doc-0:3.6-5.11.4.ppc", "5Client:libicu-doc-0:3.6-5.11.4.s390x", "5Client:libicu-doc-0:3.6-5.11.4.x86_64", "5Server:icu-0:3.6-5.11.4.i386", "5Server:icu-0:3.6-5.11.4.ia64", "5Server:icu-0:3.6-5.11.4.ppc", "5Server:icu-0:3.6-5.11.4.s390x", "5Server:icu-0:3.6-5.11.4.src", "5Server:icu-0:3.6-5.11.4.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.4.i386", "5Server:icu-debuginfo-0:3.6-5.11.4.ia64", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.4.s390", "5Server:icu-debuginfo-0:3.6-5.11.4.s390x", "5Server:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Server:libicu-0:3.6-5.11.4.i386", "5Server:libicu-0:3.6-5.11.4.ia64", "5Server:libicu-0:3.6-5.11.4.ppc", "5Server:libicu-0:3.6-5.11.4.ppc64", "5Server:libicu-0:3.6-5.11.4.s390", "5Server:libicu-0:3.6-5.11.4.s390x", "5Server:libicu-0:3.6-5.11.4.x86_64", "5Server:libicu-devel-0:3.6-5.11.4.i386", "5Server:libicu-devel-0:3.6-5.11.4.ia64", "5Server:libicu-devel-0:3.6-5.11.4.ppc", "5Server:libicu-devel-0:3.6-5.11.4.ppc64", "5Server:libicu-devel-0:3.6-5.11.4.s390", "5Server:libicu-devel-0:3.6-5.11.4.s390x", "5Server:libicu-devel-0:3.6-5.11.4.x86_64", "5Server:libicu-doc-0:3.6-5.11.4.i386", "5Server:libicu-doc-0:3.6-5.11.4.ia64", "5Server:libicu-doc-0:3.6-5.11.4.ppc", "5Server:libicu-doc-0:3.6-5.11.4.s390x", "5Server:libicu-doc-0:3.6-5.11.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0153" }, { "category": "external", "summary": "RHBZ#503071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0153", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0153" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0153", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0153" } ], "release_date": "2007-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-25T14:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:icu-0:3.6-5.11.4.i386", "5Client-Workstation:icu-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-0:3.6-5.11.4.src", "5Client-Workstation:icu-0:3.6-5.11.4.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.x86_64", "5Client:icu-0:3.6-5.11.4.i386", "5Client:icu-0:3.6-5.11.4.ia64", "5Client:icu-0:3.6-5.11.4.ppc", "5Client:icu-0:3.6-5.11.4.s390x", "5Client:icu-0:3.6-5.11.4.src", "5Client:icu-0:3.6-5.11.4.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.4.i386", "5Client:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.4.s390", "5Client:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client:libicu-0:3.6-5.11.4.i386", "5Client:libicu-0:3.6-5.11.4.ia64", "5Client:libicu-0:3.6-5.11.4.ppc", "5Client:libicu-0:3.6-5.11.4.ppc64", "5Client:libicu-0:3.6-5.11.4.s390", "5Client:libicu-0:3.6-5.11.4.s390x", "5Client:libicu-0:3.6-5.11.4.x86_64", "5Client:libicu-devel-0:3.6-5.11.4.i386", "5Client:libicu-devel-0:3.6-5.11.4.ia64", "5Client:libicu-devel-0:3.6-5.11.4.ppc", "5Client:libicu-devel-0:3.6-5.11.4.ppc64", "5Client:libicu-devel-0:3.6-5.11.4.s390", "5Client:libicu-devel-0:3.6-5.11.4.s390x", "5Client:libicu-devel-0:3.6-5.11.4.x86_64", "5Client:libicu-doc-0:3.6-5.11.4.i386", "5Client:libicu-doc-0:3.6-5.11.4.ia64", "5Client:libicu-doc-0:3.6-5.11.4.ppc", "5Client:libicu-doc-0:3.6-5.11.4.s390x", "5Client:libicu-doc-0:3.6-5.11.4.x86_64", "5Server:icu-0:3.6-5.11.4.i386", "5Server:icu-0:3.6-5.11.4.ia64", "5Server:icu-0:3.6-5.11.4.ppc", "5Server:icu-0:3.6-5.11.4.s390x", "5Server:icu-0:3.6-5.11.4.src", "5Server:icu-0:3.6-5.11.4.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.4.i386", "5Server:icu-debuginfo-0:3.6-5.11.4.ia64", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.4.s390", "5Server:icu-debuginfo-0:3.6-5.11.4.s390x", "5Server:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Server:libicu-0:3.6-5.11.4.i386", "5Server:libicu-0:3.6-5.11.4.ia64", "5Server:libicu-0:3.6-5.11.4.ppc", "5Server:libicu-0:3.6-5.11.4.ppc64", "5Server:libicu-0:3.6-5.11.4.s390", "5Server:libicu-0:3.6-5.11.4.s390x", "5Server:libicu-0:3.6-5.11.4.x86_64", "5Server:libicu-devel-0:3.6-5.11.4.i386", "5Server:libicu-devel-0:3.6-5.11.4.ia64", "5Server:libicu-devel-0:3.6-5.11.4.ppc", "5Server:libicu-devel-0:3.6-5.11.4.ppc64", "5Server:libicu-devel-0:3.6-5.11.4.s390", "5Server:libicu-devel-0:3.6-5.11.4.s390x", "5Server:libicu-devel-0:3.6-5.11.4.x86_64", "5Server:libicu-doc-0:3.6-5.11.4.i386", "5Server:libicu-doc-0:3.6-5.11.4.ia64", "5Server:libicu-doc-0:3.6-5.11.4.ppc", "5Server:libicu-doc-0:3.6-5.11.4.s390x", "5Server:libicu-doc-0:3.6-5.11.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1122" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "5Client-Workstation:icu-0:3.6-5.11.4.i386", "5Client-Workstation:icu-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-0:3.6-5.11.4.src", "5Client-Workstation:icu-0:3.6-5.11.4.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.4.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.4.x86_64", "5Client:icu-0:3.6-5.11.4.i386", "5Client:icu-0:3.6-5.11.4.ia64", "5Client:icu-0:3.6-5.11.4.ppc", "5Client:icu-0:3.6-5.11.4.s390x", "5Client:icu-0:3.6-5.11.4.src", "5Client:icu-0:3.6-5.11.4.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.4.i386", "5Client:icu-debuginfo-0:3.6-5.11.4.ia64", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc", "5Client:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.4.s390", "5Client:icu-debuginfo-0:3.6-5.11.4.s390x", "5Client:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Client:libicu-0:3.6-5.11.4.i386", "5Client:libicu-0:3.6-5.11.4.ia64", "5Client:libicu-0:3.6-5.11.4.ppc", "5Client:libicu-0:3.6-5.11.4.ppc64", "5Client:libicu-0:3.6-5.11.4.s390", "5Client:libicu-0:3.6-5.11.4.s390x", "5Client:libicu-0:3.6-5.11.4.x86_64", "5Client:libicu-devel-0:3.6-5.11.4.i386", "5Client:libicu-devel-0:3.6-5.11.4.ia64", "5Client:libicu-devel-0:3.6-5.11.4.ppc", "5Client:libicu-devel-0:3.6-5.11.4.ppc64", "5Client:libicu-devel-0:3.6-5.11.4.s390", "5Client:libicu-devel-0:3.6-5.11.4.s390x", "5Client:libicu-devel-0:3.6-5.11.4.x86_64", "5Client:libicu-doc-0:3.6-5.11.4.i386", "5Client:libicu-doc-0:3.6-5.11.4.ia64", "5Client:libicu-doc-0:3.6-5.11.4.ppc", "5Client:libicu-doc-0:3.6-5.11.4.s390x", "5Client:libicu-doc-0:3.6-5.11.4.x86_64", "5Server:icu-0:3.6-5.11.4.i386", "5Server:icu-0:3.6-5.11.4.ia64", "5Server:icu-0:3.6-5.11.4.ppc", "5Server:icu-0:3.6-5.11.4.s390x", "5Server:icu-0:3.6-5.11.4.src", "5Server:icu-0:3.6-5.11.4.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.4.i386", "5Server:icu-debuginfo-0:3.6-5.11.4.ia64", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc", "5Server:icu-debuginfo-0:3.6-5.11.4.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.4.s390", "5Server:icu-debuginfo-0:3.6-5.11.4.s390x", "5Server:icu-debuginfo-0:3.6-5.11.4.x86_64", "5Server:libicu-0:3.6-5.11.4.i386", "5Server:libicu-0:3.6-5.11.4.ia64", "5Server:libicu-0:3.6-5.11.4.ppc", "5Server:libicu-0:3.6-5.11.4.ppc64", "5Server:libicu-0:3.6-5.11.4.s390", "5Server:libicu-0:3.6-5.11.4.s390x", "5Server:libicu-0:3.6-5.11.4.x86_64", "5Server:libicu-devel-0:3.6-5.11.4.i386", "5Server:libicu-devel-0:3.6-5.11.4.ia64", "5Server:libicu-devel-0:3.6-5.11.4.ppc", "5Server:libicu-devel-0:3.6-5.11.4.ppc64", "5Server:libicu-devel-0:3.6-5.11.4.s390", "5Server:libicu-devel-0:3.6-5.11.4.s390x", "5Server:libicu-devel-0:3.6-5.11.4.x86_64", "5Server:libicu-doc-0:3.6-5.11.4.i386", "5Server:libicu-doc-0:3.6-5.11.4.ia64", "5Server:libicu-doc-0:3.6-5.11.4.ppc", "5Server:libicu-doc-0:3.6-5.11.4.s390x", "5Server:libicu-doc-0:3.6-5.11.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "icu: XSS vulnerability due to improper invalid byte sequence handling" } ] }
ghsa-hc72-qh6j-jvwc
Vulnerability from github
International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
{ "affected": [], "aliases": [ "CVE-2009-0153" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-05-13T15:30:00Z", "severity": "MODERATE" }, "details": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GHSA-hc72-qh6j-jvwc", "modified": "2022-05-02T03:13:12Z", "published": "2022-05-02T03:13:12Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0153" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" }, { "type": "WEB", "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/35074" }, { "type": "WEB", "url": "http://secunia.com/advisories/35379" }, { "type": "WEB", "url": "http://secunia.com/advisories/35436" }, { "type": "WEB", "url": "http://secunia.com/advisories/35498" }, { "type": "WEB", "url": "http://secunia.com/advisories/35584" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3549" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3613" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3639" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1122.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/34926" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/34974" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1621" } ], "schema_version": "1.4.0", "severity": [] }
var-200902-0880
Vulnerability from variot
International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks. The International Components for Unicode is prone to an input-validation vulnerability because the library may incorrectly convert some invalid byte sequences. An attacker may leverage this vulnerability to bypass content filters. This may lead to cross-site scripting attacks or allow the attacker to obtain sensitive information in some cases. Other attacks are also possible. NOTE: This issue was previously covered in BID 34926 (Apple Mac OS X 2009-002 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. There is a bug in the implementation of ICU's handling of certain character encodings. =========================================================== Ubuntu Security Notice USN-846-1 October 08, 2009 icu vulnerability CVE-2009-0153 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS: libicu38 3.8-6ubuntu0.2
Ubuntu 8.10: libicu38 3.8.1-2ubuntu0.2
Ubuntu 9.04: libicu38 3.8.1-3ubuntu1.1
After a standard system upgrade you need to restart applications linked against libicu, such as OpenOffice.org, to effect the necessary changes. If an application using ICU processed crafted data, content security mechanisms could be bypassed, potentially leading to cross-site scripting (XSS) attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1889-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff September 16, 2009 http://www.debian.org/security/faq
Package : icu Vulnerability : programming error Problem type : local(remote) Debian-specific: no CVE Id(s) : CVE-2009-0153
It was discovered that the ICU unicode library performed incorrect processing of invalid multibyte sequences, resulting in potential bypass of security mechanisms.
For the old stable distribution (etch), this problem has been fixed in version 3.6-2etch3.
For the stable distribution (lenny), this problem has been fixed in version 3.8.1-3+lenny2.
For the unstable distribution (sid), this problem has been fixed in version 4.0.1-1.
We recommend that you upgrade your icu packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.dsc Size/MD5 checksum: 592 8b600075600533ce08c9801ffa571a19 http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.diff.gz Size/MD5 checksum: 45190 601af38fe10a27e08e40985c409bc6c4 http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz Size/MD5 checksum: 9778863 0f1bda1992b4adca62da68a7ad79d830
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch3_all.deb Size/MD5 checksum: 3239572 8bf16fb7db375fb14de7082bcb814733
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_alpha.deb Size/MD5 checksum: 5586140 1244a1b89188c020a97468dc25d22af7 http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_alpha.deb Size/MD5 checksum: 7012868 8680617bb8c38f6abef169b572a76baa
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_amd64.deb Size/MD5 checksum: 5444866 f9271ec21977880f74955cfe06b7580d http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_amd64.deb Size/MD5 checksum: 6573726 25374ce8e6ae12b655a9744db65b9455
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_hppa.deb Size/MD5 checksum: 5913798 20c8976b23d28d9bc91ea053748d79e0 http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_hppa.deb Size/MD5 checksum: 7110674 bee82145df32672bf5d61e29dd3d6bc3
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_i386.deb Size/MD5 checksum: 6466444 d8e1c31e6f1d238353340a9b82da1ed8 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_i386.deb Size/MD5 checksum: 5470148 f5d9e50ecb224df9ae4f0c7057097f54
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_ia64.deb Size/MD5 checksum: 5869036 c305e7cff86ad5584c4842fec7619fd8 http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_ia64.deb Size/MD5 checksum: 7243932 effc8dc2ed962de903e848ff402c167a
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mips.deb Size/MD5 checksum: 5747354 39624db186bbf7ce259c47681d0a1cfc http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mips.deb Size/MD5 checksum: 7052540 c159699731d592ec60fcfd4bbe010a51
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mipsel.deb Size/MD5 checksum: 6769230 32e24d0b40b3f2e62e0c2c4c4be96dce http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mipsel.deb Size/MD5 checksum: 5464426 5f544b29dd41d8326ddfd70b31e4045a
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_powerpc.deb Size/MD5 checksum: 6891510 af8e8b416b43a9d6c5f5893dd63261d6 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_powerpc.deb Size/MD5 checksum: 5750422 ec7b53398b703da8f7e166a33768e260
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_s390.deb Size/MD5 checksum: 6896648 d6e3cde239924756df46b084e80388d4 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_s390.deb Size/MD5 checksum: 5781028 e5c3b53fdcda2562a206d92b15a5f520
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_sparc.deb Size/MD5 checksum: 6774462 94ce55cf609a906af5336f32b6c2ee22 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_sparc.deb Size/MD5 checksum: 5673738 d63d35c169da448d83074fa45e25ed64
Debian GNU/Linux 5.0 alias lenny
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.diff.gz Size/MD5 checksum: 41943 57d76fe9884c543a634bfd44425a42c6 http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz Size/MD5 checksum: 10591204 ca52a1eb5050478f5f7d24e16ce01f57 http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.dsc Size/MD5 checksum: 1298 e0528ce00964025af9b2f940f588664a
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny2_all.deb Size/MD5 checksum: 3659700 69882d02e07863b195b7e9b798bdeff2
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_alpha.deb Size/MD5 checksum: 6068242 7e4d26e612e178ebac27cbd2a7db72a9 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_alpha.deb Size/MD5 checksum: 7568600 18c17c486d3ee39d0c0b1574d219c228 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_alpha.deb Size/MD5 checksum: 2366836 bb1325175eb3086459d6a1daba52d010
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_amd64.deb Size/MD5 checksum: 5932454 22e0013e161bf6ec46fdb7e330fa9c2e http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny2_amd64.deb Size/MD5 checksum: 5919044 c785a70caa0bf88a644f0b65011915ee http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_amd64.deb Size/MD5 checksum: 2404096 2ce67914c39c474ff42f57ffc24bb263 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_amd64.deb Size/MD5 checksum: 7123322 5357c9591d7cea42b4cd9bd00b6c9114 http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny2_amd64.deb Size/MD5 checksum: 6063026 bde21ee163171d88d1d3b96cfa795d9b
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_arm.deb Size/MD5 checksum: 5910002 195d7e79719dc7b6275776eb29b28b3a http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_arm.deb Size/MD5 checksum: 7183106 d5939d433c5e647e1c75af8fb27351d7 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_arm.deb Size/MD5 checksum: 2287448 c3e04dae0ad884951cc1ba6663026fed
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_armel.deb Size/MD5 checksum: 5848632 1adf442fa32cd182384d2d2608000ef8 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_armel.deb Size/MD5 checksum: 7420504 f593ee94d7bdb4bb8c0796aebfaccd61 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_armel.deb Size/MD5 checksum: 1758708 cffc60f24a4293d362d82fb6483d38fd
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_hppa.deb Size/MD5 checksum: 6379014 1cdb8e9a77f953d7846eb12976efb04f http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_hppa.deb Size/MD5 checksum: 7667266 2b4fa947ccb1c56e0a1ab997081349ad http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_hppa.deb Size/MD5 checksum: 2360524 012847a53a622bb3dff6a522c0521801
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_i386.deb Size/MD5 checksum: 2278340 b95d691813f7d32d7bc1a8aa96ddcd94 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_i386.deb Size/MD5 checksum: 6975168 e5c844c5ce908655075dd49c57182b3f http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_i386.deb Size/MD5 checksum: 5918780 a471bd785fecadc4a7acd91be38a1bca
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_ia64.deb Size/MD5 checksum: 6398722 9a8fb2a23112dfa081285f2b34bc2c48 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_ia64.deb Size/MD5 checksum: 7828890 a56ec00c1e33f8abaaa73e211e3f26c1 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_ia64.deb Size/MD5 checksum: 2210326 674686adc1b87ef59144e90fdddb6e8a
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mips.deb Size/MD5 checksum: 6209236 3f2f1f954799ec7c20226b66578496fb http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mips.deb Size/MD5 checksum: 7601662 e5873a370ba2f10e07ba438221ec9326 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mips.deb Size/MD5 checksum: 2475268 9ccfeff2fbd457798ad595513c3fceb8
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mipsel.deb Size/MD5 checksum: 7294770 e7a2b87be42cf6c2eb5defc1f16fcd1b http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mipsel.deb Size/MD5 checksum: 5900392 1fd37ee3d1d15c3ad251a5b4e2707275 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mipsel.deb Size/MD5 checksum: 2408066 8c5b8b9e7eb46d8404d6fbdf319ba647
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_powerpc.deb Size/MD5 checksum: 2378760 842531d765b7bcd25f27535f7e2195fa http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_powerpc.deb Size/MD5 checksum: 7462340 0ce58e5b42bf6cea3488fc55af9b0721 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_powerpc.deb Size/MD5 checksum: 6292462 d8ca2eb3b172e43405339d1ddb233b66
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_s390.deb Size/MD5 checksum: 7436198 33277bb42e73a64ae8421c5ce4cc390a http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_s390.deb Size/MD5 checksum: 6270994 b23dd748a28ccde33d87d7df945693a2 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_s390.deb Size/MD5 checksum: 2471744 926e06bca83a31ce3aca813409cc95a8
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_sparc.deb Size/MD5 checksum: 7304054 9f98cb39fce383087d192faa2fc47386 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_sparc.deb Size/MD5 checksum: 2135440 3db054d567561c48e935814465e4a525 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_sparc.deb Size/MD5 checksum: 6146402 1bfc509accd39f0ca52b871b4af534a2
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iEYEARECAAYFAkqxN9cACgkQXm3vHE4uylp6WACcDP/faUO12bVfOeG8qVHMiiRv oKUAn0ZXj9WAkxDxgUbpM2SEG6TuoUgo =FNYT -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200902-0880", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.6" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.6" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5 to v10.5.6" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5 to v10.5.6" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "1.0 to 2.2.1" }, { "model": "ios for ipod touch", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "1.1 to 2.2.1" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.3.z (server)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux enterprise", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.4" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "ipod touch", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "iphone", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "3.0" } ], "sources": [ { "db": "BID", "id": "34974" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "CNNVD", "id": "CNNVD-200905-169" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-0153" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Charlie MillerAndrew MortensenMoritz Jodeit moritz@jodeit.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200905-169" } ], "trust": 0.6 }, "cve": "CVE-2009-0153", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-0153", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-37599", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-0153", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200905-169", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-37599", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-37599" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "CNNVD", "id": "CNNVD-200905-169" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks. The International Components for Unicode is prone to an input-validation vulnerability because the library may incorrectly convert some invalid byte sequences. \nAn attacker may leverage this vulnerability to bypass content filters. This may lead to cross-site scripting attacks or allow the attacker to obtain sensitive information in some cases. Other attacks are also possible. \nNOTE: This issue was previously covered in BID 34926 (Apple Mac OS X 2009-002 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. There is a bug in the implementation of ICU\u0027s handling of certain character encodings. ===========================================================\nUbuntu Security Notice USN-846-1 October 08, 2009\nicu vulnerability\nCVE-2009-0153\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 8.04 LTS:\n libicu38 3.8-6ubuntu0.2\n\nUbuntu 8.10:\n libicu38 3.8.1-2ubuntu0.2\n\nUbuntu 9.04:\n libicu38 3.8.1-3ubuntu1.1\n\nAfter a standard system upgrade you need to restart applications linked\nagainst libicu, such as OpenOffice.org, to effect the necessary changes. If an application using ICU processed crafted\ndata, content security mechanisms could be bypassed, potentially leading to\ncross-site scripting (XSS) attacks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1889-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nSeptember 16, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : icu\nVulnerability : programming error\nProblem type : local(remote)\nDebian-specific: no\nCVE Id(s) : CVE-2009-0153\n\nIt was discovered that the ICU unicode library performed incorrect \nprocessing of invalid multibyte sequences, resulting in potential\nbypass of security mechanisms. \n\nFor the old stable distribution (etch), this problem has been fixed in\nversion 3.6-2etch3. \n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 3.8.1-3+lenny2. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 4.0.1-1. \n\nWe recommend that you upgrade your icu packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.dsc\n Size/MD5 checksum: 592 8b600075600533ce08c9801ffa571a19\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.diff.gz\n Size/MD5 checksum: 45190 601af38fe10a27e08e40985c409bc6c4\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz\n Size/MD5 checksum: 9778863 0f1bda1992b4adca62da68a7ad79d830\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch3_all.deb\n Size/MD5 checksum: 3239572 8bf16fb7db375fb14de7082bcb814733\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_alpha.deb\n Size/MD5 checksum: 5586140 1244a1b89188c020a97468dc25d22af7\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_alpha.deb\n Size/MD5 checksum: 7012868 8680617bb8c38f6abef169b572a76baa\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_amd64.deb\n Size/MD5 checksum: 5444866 f9271ec21977880f74955cfe06b7580d\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_amd64.deb\n Size/MD5 checksum: 6573726 25374ce8e6ae12b655a9744db65b9455\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_hppa.deb\n Size/MD5 checksum: 5913798 20c8976b23d28d9bc91ea053748d79e0\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_hppa.deb\n Size/MD5 checksum: 7110674 bee82145df32672bf5d61e29dd3d6bc3\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_i386.deb\n Size/MD5 checksum: 6466444 d8e1c31e6f1d238353340a9b82da1ed8\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_i386.deb\n Size/MD5 checksum: 5470148 f5d9e50ecb224df9ae4f0c7057097f54\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_ia64.deb\n Size/MD5 checksum: 5869036 c305e7cff86ad5584c4842fec7619fd8\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_ia64.deb\n Size/MD5 checksum: 7243932 effc8dc2ed962de903e848ff402c167a\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mips.deb\n Size/MD5 checksum: 5747354 39624db186bbf7ce259c47681d0a1cfc\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mips.deb\n Size/MD5 checksum: 7052540 c159699731d592ec60fcfd4bbe010a51\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mipsel.deb\n Size/MD5 checksum: 6769230 32e24d0b40b3f2e62e0c2c4c4be96dce\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mipsel.deb\n Size/MD5 checksum: 5464426 5f544b29dd41d8326ddfd70b31e4045a\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_powerpc.deb\n Size/MD5 checksum: 6891510 af8e8b416b43a9d6c5f5893dd63261d6\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_powerpc.deb\n Size/MD5 checksum: 5750422 ec7b53398b703da8f7e166a33768e260\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_s390.deb\n Size/MD5 checksum: 6896648 d6e3cde239924756df46b084e80388d4\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_s390.deb\n Size/MD5 checksum: 5781028 e5c3b53fdcda2562a206d92b15a5f520\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_sparc.deb\n Size/MD5 checksum: 6774462 94ce55cf609a906af5336f32b6c2ee22\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_sparc.deb\n Size/MD5 checksum: 5673738 d63d35c169da448d83074fa45e25ed64\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.diff.gz\n Size/MD5 checksum: 41943 57d76fe9884c543a634bfd44425a42c6\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz\n Size/MD5 checksum: 10591204 ca52a1eb5050478f5f7d24e16ce01f57\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.dsc\n Size/MD5 checksum: 1298 e0528ce00964025af9b2f940f588664a\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny2_all.deb\n Size/MD5 checksum: 3659700 69882d02e07863b195b7e9b798bdeff2\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_alpha.deb\n Size/MD5 checksum: 6068242 7e4d26e612e178ebac27cbd2a7db72a9\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_alpha.deb\n Size/MD5 checksum: 7568600 18c17c486d3ee39d0c0b1574d219c228\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_alpha.deb\n Size/MD5 checksum: 2366836 bb1325175eb3086459d6a1daba52d010\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_amd64.deb\n Size/MD5 checksum: 5932454 22e0013e161bf6ec46fdb7e330fa9c2e\n http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny2_amd64.deb\n Size/MD5 checksum: 5919044 c785a70caa0bf88a644f0b65011915ee\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_amd64.deb\n Size/MD5 checksum: 2404096 2ce67914c39c474ff42f57ffc24bb263\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_amd64.deb\n Size/MD5 checksum: 7123322 5357c9591d7cea42b4cd9bd00b6c9114\n http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny2_amd64.deb\n Size/MD5 checksum: 6063026 bde21ee163171d88d1d3b96cfa795d9b\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_arm.deb\n Size/MD5 checksum: 5910002 195d7e79719dc7b6275776eb29b28b3a\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_arm.deb\n Size/MD5 checksum: 7183106 d5939d433c5e647e1c75af8fb27351d7\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_arm.deb\n Size/MD5 checksum: 2287448 c3e04dae0ad884951cc1ba6663026fed\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_armel.deb\n Size/MD5 checksum: 5848632 1adf442fa32cd182384d2d2608000ef8\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_armel.deb\n Size/MD5 checksum: 7420504 f593ee94d7bdb4bb8c0796aebfaccd61\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_armel.deb\n Size/MD5 checksum: 1758708 cffc60f24a4293d362d82fb6483d38fd\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_hppa.deb\n Size/MD5 checksum: 6379014 1cdb8e9a77f953d7846eb12976efb04f\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_hppa.deb\n Size/MD5 checksum: 7667266 2b4fa947ccb1c56e0a1ab997081349ad\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_hppa.deb\n Size/MD5 checksum: 2360524 012847a53a622bb3dff6a522c0521801\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_i386.deb\n Size/MD5 checksum: 2278340 b95d691813f7d32d7bc1a8aa96ddcd94\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_i386.deb\n Size/MD5 checksum: 6975168 e5c844c5ce908655075dd49c57182b3f\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_i386.deb\n Size/MD5 checksum: 5918780 a471bd785fecadc4a7acd91be38a1bca\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_ia64.deb\n Size/MD5 checksum: 6398722 9a8fb2a23112dfa081285f2b34bc2c48\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_ia64.deb\n Size/MD5 checksum: 7828890 a56ec00c1e33f8abaaa73e211e3f26c1\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_ia64.deb\n Size/MD5 checksum: 2210326 674686adc1b87ef59144e90fdddb6e8a\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mips.deb\n Size/MD5 checksum: 6209236 3f2f1f954799ec7c20226b66578496fb\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mips.deb\n Size/MD5 checksum: 7601662 e5873a370ba2f10e07ba438221ec9326\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mips.deb\n Size/MD5 checksum: 2475268 9ccfeff2fbd457798ad595513c3fceb8\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mipsel.deb\n Size/MD5 checksum: 7294770 e7a2b87be42cf6c2eb5defc1f16fcd1b\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mipsel.deb\n Size/MD5 checksum: 5900392 1fd37ee3d1d15c3ad251a5b4e2707275\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mipsel.deb\n Size/MD5 checksum: 2408066 8c5b8b9e7eb46d8404d6fbdf319ba647\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_powerpc.deb\n Size/MD5 checksum: 2378760 842531d765b7bcd25f27535f7e2195fa\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_powerpc.deb\n Size/MD5 checksum: 7462340 0ce58e5b42bf6cea3488fc55af9b0721\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_powerpc.deb\n Size/MD5 checksum: 6292462 d8ca2eb3b172e43405339d1ddb233b66\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_s390.deb\n Size/MD5 checksum: 7436198 33277bb42e73a64ae8421c5ce4cc390a\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_s390.deb\n Size/MD5 checksum: 6270994 b23dd748a28ccde33d87d7df945693a2\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_s390.deb\n Size/MD5 checksum: 2471744 926e06bca83a31ce3aca813409cc95a8\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_sparc.deb\n Size/MD5 checksum: 7304054 9f98cb39fce383087d192faa2fc47386\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_sparc.deb\n Size/MD5 checksum: 2135440 3db054d567561c48e935814465e4a525\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_sparc.deb\n Size/MD5 checksum: 6146402 1bfc509accd39f0ca52b871b4af534a2\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAkqxN9cACgkQXm3vHE4uylp6WACcDP/faUO12bVfOeG8qVHMiiRv\noKUAn0ZXj9WAkxDxgUbpM2SEG6TuoUgo\n=FNYT\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2009-0153" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "BID", "id": "34974" }, { "db": "VULHUB", "id": "VHN-37599" }, { "db": "PACKETSTORM", "id": "81881" }, { "db": "PACKETSTORM", "id": "81386" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-37599", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-37599" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-0153", "trust": 3.0 }, { "db": "VUPEN", "id": "ADV-2009-1522", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2009-1297", "trust": 2.5 }, { "db": "USCERT", "id": "TA09-133A", "trust": 2.5 }, { "db": "SECUNIA", "id": "35074", "trust": 2.5 }, { "db": "BID", "id": "34974", "trust": 2.0 }, { "db": "VUPEN", "id": "ADV-2009-1621", "trust": 1.7 }, { "db": "SECUNIA", "id": "35436", "trust": 1.7 }, { "db": "SECUNIA", "id": "35379", "trust": 1.7 }, { "db": "SECUNIA", "id": "35584", "trust": 1.7 }, { "db": "SECUNIA", "id": "35498", "trust": 1.7 }, { "db": "BID", "id": "34926", "trust": 1.7 }, { "db": "XF", "id": "50488", "trust": 1.4 }, { "db": "USCERT", "id": "SA09-133A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2009-001326", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200905-169", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2009-05-12", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2009-06-17-1", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2009-06-08-1", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2009:1122", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2009-6121", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2009-6273", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA09-133A", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "81881", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "81386", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-37599", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-37599" }, { "db": "BID", "id": "34974" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "PACKETSTORM", "id": "81881" }, { "db": "PACKETSTORM", "id": "81386" }, { "db": "CNNVD", "id": "CNNVD-200905-169" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "id": "VAR-200902-0880", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-37599" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:39:24.164000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT3613", "trust": 0.8, "url": "http://support.apple.com/kb/ht3613" }, { "title": "HT3639", "trust": 0.8, "url": "http://support.apple.com/kb/ht3639" }, { "title": "HT3549", "trust": 0.8, "url": "http://support.apple.com/kb/ht3549" }, { "title": "HT3613", "trust": 0.8, "url": "http://support.apple.com/kb/ht3613?viewlocale=ja_jp" }, { "title": "HT3639", "trust": 0.8, "url": "http://support.apple.com/kb/ht3639?viewlocale=ja_jp" }, { "title": "HT3549", "trust": 0.8, "url": "http://support.apple.com/kb/ht3549?viewlocale=ja_jp" }, { "title": "icu-3.6-5.11.4", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=449" }, { "title": "RHSA-2009:1122", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2009-1122.html" }, { "title": "RHSA-2009:1122", "trust": 0.8, "url": "https://www.jp.redhat.com/support/errata/rhsa/rhsa-2009-1122j.html" }, { "title": "TA09-133A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta09-133a.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001326" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-37599" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta09-133a.html" }, { "trust": 2.5, "url": "http://secunia.com/advisories/35074" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/may/msg00002.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/34926" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/34974" }, { "trust": 1.7, "url": "http://bugs.icu-project.org/trac/ticket/5691" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3549" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3613" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3639" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg00336.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg00478.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2009-1122.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35379" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35436" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35498" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35584" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/50488" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11366" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0153" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta09-133a/" }, { "trust": 0.8, "url": "http://jvn.jp/tr/jvntr-2009-12" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0153" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa09-133a.html" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2009-254.htm" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0153" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8-6ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.8-6ubuntu0.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu38_3.8.1-3ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu38_3.8-6ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-3ubuntu1.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu38_3.8.1-2ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8-6ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-3ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu-dev_3.8-6ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-3ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu-dev_3.8.1-2ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-3ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-3ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-3ubuntu1.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-3ubuntu1.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-3ubuntu1.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-2ubuntu0.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu-dev_3.8.1-3ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-3ubuntu1.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-2ubuntu0.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8-6ubuntu0.2.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-3ubuntu1.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8-6ubuntu0.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-3ubuntu1.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.8.1-3ubuntu1.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-3ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-3ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-3ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-3ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-3ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.8.1-2ubuntu0.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-3ubuntu1.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_alpha.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_arm.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny2.dsc" } ], "sources": [ { "db": "VULHUB", "id": "VHN-37599" }, { "db": "BID", "id": "34974" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "PACKETSTORM", "id": "81881" }, { "db": "PACKETSTORM", "id": "81386" }, { "db": "CNNVD", "id": "CNNVD-200905-169" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-37599" }, { "db": "BID", "id": "34974" }, { "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "db": "PACKETSTORM", "id": "81881" }, { "db": "PACKETSTORM", "id": "81386" }, { "db": "CNNVD", "id": "CNNVD-200905-169" }, { "db": "NVD", "id": "CVE-2009-0153" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-05-13T00:00:00", "db": "VULHUB", "id": "VHN-37599" }, { "date": "2009-05-12T00:00:00", "db": "BID", "id": "34974" }, { "date": "2009-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "date": "2009-10-09T00:22:03", "db": "PACKETSTORM", "id": "81881" }, { "date": "2009-09-16T23:12:39", "db": "PACKETSTORM", "id": "81386" }, { "date": "2009-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200905-169" }, { "date": "2009-05-13T15:30:00.360000", "db": "NVD", "id": "CVE-2009-0153" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-37599" }, { "date": "2015-04-13T21:50:00", "db": "BID", "id": "34974" }, { "date": "2009-08-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001326" }, { "date": "2009-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200905-169" }, { "date": "2017-09-29T01:33:39.340000", "db": "NVD", "id": "CVE-2009-0153" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200905-169" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X of ICU Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001326" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "81881" }, { "db": "CNNVD", "id": "CNNVD-200905-169" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.