cve-2009-2409
Vulnerability from cvelistv5
Published
2009-07-30 19:00
Modified
2024-08-07 05:52
Severity ?
Summary
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
References
secalert@redhat.comhttp://java.sun.com/j2se/1.5.0/ReleaseNotes.htmlPatch
secalert@redhat.comhttp://java.sun.com/javase/6/webnotes/6u17.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlVendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36139Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36157Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36669
secalert@redhat.comhttp://secunia.com/advisories/36739Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37386Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42467Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200911-02.xml
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200912-01.xml
secalert@redhat.comhttp://support.apple.com/kb/HT3937
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1874
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:197
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:216
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:258
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:084
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1207.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1432.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/515055/100/0/threaded
secalert@redhat.comhttp://www.securitytracker.com/id?1022631
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-810-1
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2010-0019.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2085Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/3184Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/3126Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409
secalert@redhat.comhttps://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
secalert@redhat.comhttps://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594
secalert@redhat.comhttps://rhn.redhat.com/errata/RHSA-2010-0095.html
secalert@redhat.comhttps://usn.ubuntu.com/810-2/
secalert@redhat.comhttps://www.debian.org/security/2009/dsa-1888
af854a3a-2127-422b-91ae-364da2661108http://java.sun.com/j2se/1.5.0/ReleaseNotes.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://java.sun.com/javase/6/webnotes/6u17.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36139Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36157Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36669
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36739Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37386Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200911-02.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200912-01.xml
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3937
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1874
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:197
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:216
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:258
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1207.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1432.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/515055/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022631
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-810-1
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2010-0019.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2085Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3184Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/3126Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409
af854a3a-2127-422b-91ae-364da2661108https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
af854a3a-2127-422b-91ae-364da2661108https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0095.html
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/810-2/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2009/dsa-1888
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.899Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36139",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36139"
          },
          {
            "name": "36157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36157"
          },
          {
            "name": "MDVSA-2009:197",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
          },
          {
            "name": "MDVSA-2009:216",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
          },
          {
            "name": "DSA-1888",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2009/dsa-1888"
          },
          {
            "name": "oval:org.mitre.oval:def:8594",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594"
          },
          {
            "name": "GLSA-200911-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
          },
          {
            "name": "36434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36434"
          },
          {
            "name": "GLSA-200912-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200912-01.xml"
          },
          {
            "name": "1022631",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022631"
          },
          {
            "name": "42467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42467"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
          },
          {
            "name": "RHSA-2009:1207",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
          },
          {
            "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded"
          },
          {
            "name": "36669",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36669"
          },
          {
            "name": "RHSA-2009:1432",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
          },
          {
            "name": "USN-810-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-810-1"
          },
          {
            "name": "oval:org.mitre.oval:def:10763",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763"
          },
          {
            "name": "MDVSA-2009:258",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:258"
          },
          {
            "name": "USN-810-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/810-2/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://java.sun.com/javase/6/webnotes/6u17.html"
          },
          {
            "name": "oval:org.mitre.oval:def:7155",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
          },
          {
            "name": "ADV-2010-3126",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/3126"
          },
          {
            "name": "RHSA-2010:0095",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
          },
          {
            "name": "ADV-2009-3184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html"
          },
          {
            "name": "oval:org.mitre.oval:def:6631",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631"
          },
          {
            "name": "APPLE-SA-2009-11-09-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
          },
          {
            "name": "MDVSA-2010:084",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
          },
          {
            "name": "37386",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37386"
          },
          {
            "name": "ADV-2009-2085",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2085"
          },
          {
            "name": "DSA-1874",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1874"
          },
          {
            "name": "36739",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36739"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3937"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time.  NOTE: the scope of this issue is currently limited because the amount of computation required is still large."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "36139",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36139"
        },
        {
          "name": "36157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36157"
        },
        {
          "name": "MDVSA-2009:197",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
        },
        {
          "name": "MDVSA-2009:216",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
        },
        {
          "name": "DSA-1888",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2009/dsa-1888"
        },
        {
          "name": "oval:org.mitre.oval:def:8594",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594"
        },
        {
          "name": "GLSA-200911-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
        },
        {
          "name": "36434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36434"
        },
        {
          "name": "GLSA-200912-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200912-01.xml"
        },
        {
          "name": "1022631",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022631"
        },
        {
          "name": "42467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42467"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
        },
        {
          "name": "RHSA-2009:1207",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
        },
        {
          "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded"
        },
        {
          "name": "36669",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36669"
        },
        {
          "name": "RHSA-2009:1432",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
        },
        {
          "name": "USN-810-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-810-1"
        },
        {
          "name": "oval:org.mitre.oval:def:10763",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763"
        },
        {
          "name": "MDVSA-2009:258",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:258"
        },
        {
          "name": "USN-810-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/810-2/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://java.sun.com/javase/6/webnotes/6u17.html"
        },
        {
          "name": "oval:org.mitre.oval:def:7155",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
        },
        {
          "name": "ADV-2010-3126",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/3126"
        },
        {
          "name": "RHSA-2010:0095",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
        },
        {
          "name": "ADV-2009-3184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html"
        },
        {
          "name": "oval:org.mitre.oval:def:6631",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631"
        },
        {
          "name": "APPLE-SA-2009-11-09-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
        },
        {
          "name": "MDVSA-2010:084",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
        },
        {
          "name": "37386",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37386"
        },
        {
          "name": "ADV-2009-2085",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2085"
        },
        {
          "name": "DSA-1874",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1874"
        },
        {
          "name": "36739",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36739"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3937"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2409",
    "datePublished": "2009-07-30T19:00:00",
    "dateReserved": "2009-07-09T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.899Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2409\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-07-30T19:30:00.343\",\"lastModified\":\"2024-11-21T01:04:48.300\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time.  NOTE: the scope of this issue is currently limited because the amount of computation required is still large.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda Network Security Services (NSS) en versiones anteriores a 3.12.3, como se utiliza en Firefox; GnuTLS en versiones anteriores a 2.6.4 y 2.7.4; OpenSSL 0.9.8 hasta la versi\u00f3n 0.9.8k; y otros productos que soportan MD2 con certificados X.509, lo que podr\u00edan permitir a atacantes remotos falsificar certificados usando defectos de dise\u00f1o de MD2 para generar una colisi\u00f3n de hash en menos que tiempo que con fuerza bruta. NOTA: el alcance de este problema est\u00e1 actualmente limitado porque la cantidad de computaci\u00f3n requerida es todav\u00eda grande.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E6A30E-7577-4569-9309-53A0AF7FE3AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E6A30E-7577-4569-9309-53A0AF7FE3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.12.2\",\"matchCriteriaId\":\"FD8D62AB-8BC8-4A00-ACDA-5D224C043129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDA50B0-D3D2-456D-B48A-BD5EE72B8E7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C15CFFC-5D0F-4BBB-9428-06B475274235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141015B2-BE49-4EE8-ABE8-E8D18DA2C9E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91423E7A-6AD0-4203-A779-E4495E889310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC8DF55-463F-4002-A227-05E51545EBE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41F970E-8918-4A30-B3E2-BDEF85FFF372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44BF206-EBE6-4FC6-97E8-6C2C994612AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8DEE0E-354F-4C7A-8AE1-0F21E91829A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0E4EB6-8389-47B8-839F-1B8D4E781A13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4F2FFC-CAE0-480D-8FCE-E7A8923ED452\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04657D90-D5E4-4EFA-9016-1459815C0393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A235D9-DA84-4448-B4AB-0D2BD809B3B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCA94E0-F5CF-4873-AD4B-ADA82967A5F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAF7717-A813-411A-A18A-2524EB63C949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B8CAE7-D938-4CF4-BB75-C039CACA0968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48D1426-B803-4E55-996D-E397CE6A5FAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C893C67-6E8F-4C37-9DC3-52BA2D4C441C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24304AE2-ECA2-4255-B0F3-245CDBE630C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4145734-9500-4818-BA42-22691386571F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CB9668-2D0D-4101-B895-9A792402EC4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3CB1AC-EC26-4AC3-84F9-0A6D4B54B634\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B25E1B37-9809-4855-BE37-358F25DE6FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9ED04A6-49B8-42DC-BF0F-868CD60473F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D38075-BD60-4D44-99FA-3756A735BD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64487A7D-770E-4F71-9DCD-50336F681B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9A0BAB-3B27-4E54-8881-F56FC3630EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A79CFF5-B1D6-4B2F-9327-B6C451C47EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542A1310-8470-4780-8AD5-C72721BA298C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:nss:3.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ACB2CAD-4C94-44B8-B61B-97CF7DA5DB26\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D3ACD5-905F-42BB-BE1A-8382E9D823BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766EA6F2-7FA4-4713-9859-9971CCD2FDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB38AEA-BAF0-4920-9A71-747C24444770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F33EA2B-DE15-4695-A383-7A337AC38908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261EE631-AB43-44FE-B02A-DFAAB8D35927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1365ED-4651-4AB2-A64B-43782EA2F0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC82690C-DCED-47BA-AA93-4D0C9E95B806\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.3\",\"matchCriteriaId\":\"95002BAD-9C8A-4DCE-A900-7948F2FC9BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBB8F2C-498D-4D31-A7D7-9991BABEA7A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8856E1B1-8007-42E5-82EF-4700D4DEEDDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CF40D3-CE03-4C2A-8EEF-EB5989291806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC60D4CC-922C-4941-A400-0CBEAC7F31D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A0D19-A17A-4007-8355-497D14CFCBF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8140DBE1-8116-4051-9A57-07535586E0AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56D2DF7F-DCDD-486D-B906-F9DDE3A1DB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CC840D-AD01-4EE2-8652-06742A6286BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84224A82-6D58-4000-A449-20C1632DAE85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A466931C-769A-4A28-B072-10930CE655E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FEE50AC-8730-4F04-B57C-6BDF8B957F6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F621DC-7967-4D97-A562-02E7033C89C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"776E5481-399F-45BC-AD20-A18508B03916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D7F972-9128-4A4D-8508-B38CE2F155E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D56873-E8C5-4E4B-BB85-6DCF6526B453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FE4766-32D0-491E-8C71-5B998C468142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F980857-2364-466A-8366-BD017D242222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDCF1F0-5A78-48FF-B4B0-303AE2420F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A2E649D-5C45-4412-927B-E3EDCE07587C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"066175C2-6E96-4BAE-B1A6-B23D25547FAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"869D3010-67AE-44D0-BB8F-D9C410AEA1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052B40C1-C29B-4189-9A45-DAE873AB716D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F71E61-7455-4E10-B9D8-2B7FDDFB10F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E05A9A1-6B7A-43FB-A9B8-41B68CA5FDCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB08FD9-9AB8-4015-A8BE-FD9F7EBAC6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B588AAE0-8C3F-47C7-812F-8C97BD8795E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB9154B-4254-4F33-8DB2-5B96E2DA4931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D9C191-6A57-40BB-BDD1-6B1A6BBAB51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2EA79D1-2EA8-4040-A5B5-C93EE937945A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D05BC3-1315-4AC7-884D-41459272C94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2901E522-6F54-4FA5-BF22-463A9D6B53D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738F29DA-9741-4BA5-B370-417443A3AC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52173492-1031-4AA4-A600-6210581059D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB636C36-2884-4F66-B68A-4494AEAF90C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"777A16E4-A1F5-48DC-9BF0-CD9F0DCF8B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC4231BD-201D-4B10-9E35-B9EEFC714F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C9200C3-0F46-4238-918B-38D95BF11547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024A9511-7CB4-4681-8429-0FE7FC34DF1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CEF5ED-87A5-44B2-8A4A-9896957C057B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B84A4F5-CED7-4633-913F-BE8235F68616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97564ABD-F9CE-4B3C-978A-1622DE3E4924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB6EC88-DCE0-439B-89CD-18229965849B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E2C89DD-CDBD-4772-A031-089F32006D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C2FD618-91F4-48E7-B945-90CC0A367DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65DC9555-E76F-4F8D-AE39-5160B34A87FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B61D180-9EEA-4258-9A59-7F004F2C83F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DE1208-BDDC-405B-A34A-B58D00A279DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EF689E-59AA-4619-ADB2-E195CFD4094A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62AB660-5DA4-4F13-AF9E-DC53D0A18EED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22314ED6-D0CD-442E-A645-A9CCFE114AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E1C5B2-27BF-4328-9336-98B8828EE4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5C952BF-A135-4B15-8A51-94D66B618469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ADED309-0A25-478D-B542-96217A0DD63E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0403DE-76B1-4E24-8014-64F73DCB53DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EA91B0-249F-41B2-8AD0-0C2AD29BE3D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F714D22-873A-4D64-8151-86BB55EFD084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E9181F9-50FF-4995-9554-022CF93376C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED0B40F-3413-40D6-B1EF-E6354D2A91F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E99A7D8-2303-4268-8EF8-6F01A042BEDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C70F69-FB80-4F32-A798-71A5153E6C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A1E604-500E-4181-BF66-BB69C7C3F425\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8120E3-B60F-44E4-B837-4707A9BAEDBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D3F16F-2C23-48E9-9F2D-1F1DF74719E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7073EAD-06C9-4309-B479-135021E82B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546C56AC-AFCC-47B7-A5A8-D3E3199BEA41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1895868E-E501-42C2-8450-EEED4447BAB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ED1FCE0-260B-4FB2-9DBD-F4D0D35639AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199AA36A-3B23-438C-9109-CC9000372986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD6FFF05-37B2-4D69-86AF-921591382D21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BF8600-4E5D-4FF4-953C-F2DC726CA6CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C40F0E-B102-4FE8-9E93-0ACFBF35226D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22802660-D33F-4683-B82F-C94AC6170A73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3623E9BE-F513-4301-BF0C-6A7F87E78E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DBAF08-1441-4F14-A740-E90044B77042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE9BB7E-DDD8-4CBF-AEC2-40D59A560BD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D3B6684-3890-4B60-BE67-D06045A86B3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C6C982-21D5-4FE3-A342-FC45BD78D2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69E3A01-D8C6-4C36-8C4E-52B96541D5B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D61596-01EB-4936-923B-63537625F926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599EB59C-7717-47A8-84C6-78B6D79AEB02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A6CBB77-818D-4DFF-9DD9-07EBF9933B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E9005E-5034-43F2-B96E-7829E19FE3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA854EA-29FE-4B91-AEA3-ED649D7FD25A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC3A5EE-2892-4548-A0CB-D3289CD64D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F22BF4-A738-438B-8D0B-6993640F0D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3193B7-8FB9-45E4-BFF6-891A3F14F021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF269AE-121B-4982-A765-5C7E806FA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C9F604-7FBE-4759-B039-8F5894574203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191821CD-E4CB-4269-B04C-284A9F9783B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A71474-958D-4689-A652-3E2A731F47FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38169043-17DF-4CF9-963A-8770B8882357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D7E5D9C-0976-4C9A-9FEB-AB923845BAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4537676-A72E-4433-B44F-3664EDD6F240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CCCB66-C7CC-4E5C-8253-C29D57BE9B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D090B10-68F2-424D-8234-2A280AA96B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23168B77-645D-4A2A-A6E3-7001104064A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D085B16-3116-423F-BDE0-2D93E12650A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59247E9-CDAE-4269-A8E4-F49F617CDD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6019C0C-E9DD-4831-8E6A-785AE1A930FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F9CF15-8789-49B6-BB6D-B784C8FF20ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DAE798-14C9-4CB6-A39F-69CDF9D8FBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C51E0C88-B19C-408D-AC17-10CE7462D48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7FBFAA-263C-4B7B-A135-9824DFD8CCDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC41482-B3BC-4C93-A850-73A179BAB763\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC80BE1-28A6-4348-A061-8FD9C805E945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8EF703-AE06-4DD7-9235-2D8CCDB24F96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A8AC314-065B-4BC3-A5EE-CA6D3006F9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8201FF6-53A8-4850-A2B2-47AA65B2CB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB33002-E5C6-4573-BC94-647DDE4E6F89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7D245A-D983-40AD-89A7-0EA00D38D570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7223691-225D-4649-B410-F41D2C489BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9E7F22-5BC4-4AD5-A630-25947CC1E5B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6B3DBF9-52EB-4741-85E4-E68645BD81E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"350A6845-77D6-4D63-A13C-5DAB55F98727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A456D12-C43A-47B0-AC0D-BF02AEBA0828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B5E7C27-A5D9-4ABD-AFC5-5367083F387F\"}]}]}],\"references\":[{\"url\":\"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://java.sun.com/javase/6/webnotes/6u17.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36139\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36157\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36434\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36669\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36739\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42467\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200912-01.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1874\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:197\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:216\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:258\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1207.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1432.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/515055/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1022631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-810-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2010-0019.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2085\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3126\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/810-2/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.debian.org/security/2009/dsa-1888\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://java.sun.com/javase/6/webnotes/6u17.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200912-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1874\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1207.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1432.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/515055/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-810-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2010-0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/810-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2009/dsa-1888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.