CVE-2009-2417 (GCVE-0-2009-2417)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 05:52
Severity ?
CWE
  • n/a
Summary
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch Patch, Vendor Advisory
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch Patch
secalert@redhat.com http://curl.haxx.se/docs/adv_20090812.txt Vendor Advisory
secalert@redhat.com http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.com http://secunia.com/advisories/36238 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/36475
secalert@redhat.com http://secunia.com/advisories/37471
secalert@redhat.com http://secunia.com/advisories/45047
secalert@redhat.com http://shibboleth.internet2.edu/secadv/secadv_20090817.txt
secalert@redhat.com http://support.apple.com/kb/HT4077
secalert@redhat.com http://wiki.rpath.com/Advisories:rPSA-2009-0124
secalert@redhat.com http://www.securityfocus.com/archive/1/506055/100/0/threaded
secalert@redhat.com http://www.securityfocus.com/archive/1/507985/100/0/threaded
secalert@redhat.com http://www.securityfocus.com/bid/36032
secalert@redhat.com http://www.ubuntu.com/usn/USN-1158-1
secalert@redhat.com http://www.vmware.com/security/advisories/VMSA-2009-0016.html
secalert@redhat.com http://www.vupen.com/english/advisories/2009/2263 Vendor Advisory
secalert@redhat.com http://www.vupen.com/english/advisories/2009/3316
secalert@redhat.com https://exchange.xforce.ibmcloud.com/vulnerabilities/52405
secalert@redhat.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
secalert@redhat.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch Patch
af854a3a-2127-422b-91ae-364da2661108 http://curl.haxx.se/docs/adv_20090812.txt Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/36238 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/36475
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/37471
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/45047
af854a3a-2127-422b-91ae-364da2661108 http://shibboleth.internet2.edu/secadv/secadv_20090817.txt
af854a3a-2127-422b-91ae-364da2661108 http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108 http://wiki.rpath.com/Advisories:rPSA-2009-0124
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/506055/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/507985/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/36032
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/USN-1158-1
af854a3a-2127-422b-91ae-364da2661108 http://www.vmware.com/security/advisories/VMSA-2009-0016.html
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2009/2263 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2009/3316
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/52405
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
          },
          {
            "name": "20090824 rPSA-2009-0124-1 curl",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
          },
          {
            "name": "37471",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "ADV-2009-2263",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2263"
          },
          {
            "name": "USN-1158-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1158-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "36238",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36238"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "curl-certificate-security-bypass(52405)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
          },
          {
            "name": "oval:org.mitre.oval:def:8542",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
          },
          {
            "name": "36475",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36475"
          },
          {
            "name": "oval:org.mitre.oval:def:10114",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/docs/adv_20090812.txt"
          },
          {
            "name": "45047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45047"
          },
          {
            "name": "36032",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36032"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
          },
          {
            "name": "ADV-2009-3316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
        },
        {
          "name": "20090824 rPSA-2009-0124-1 curl",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
        },
        {
          "name": "37471",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37471"
        },
        {
          "name": "ADV-2009-2263",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2263"
        },
        {
          "name": "USN-1158-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1158-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
        },
        {
          "name": "36238",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36238"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "curl-certificate-security-bypass(52405)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
        },
        {
          "name": "oval:org.mitre.oval:def:8542",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
        },
        {
          "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
        },
        {
          "name": "36475",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36475"
        },
        {
          "name": "oval:org.mitre.oval:def:10114",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/docs/adv_20090812.txt"
        },
        {
          "name": "45047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45047"
        },
        {
          "name": "36032",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36032"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
        },
        {
          "name": "ADV-2009-3316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3316"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2417",
    "datePublished": "2009-08-14T15:00:00",
    "dateReserved": "2009-07-09T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2417\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-08-14T15:16:27.390\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.\"},{\"lang\":\"es\",\"value\":\"lib/ssluse.c en cURL y libcurl v7.4 hasta v7.19.5, cuando se usa OpenSSL, no maneja de forma aecuada el caracter \u0027\\\\0\u0027 en un nombre de dominio en el campo sujeto del Common Name (CN) de un certificado X.509, lo que permite a atacantes de hombre en el medio hacer un spoofing de servidores SSL a trav\u00e9s de la un certificado de una autoridad de Certificaci\u00f3n leg\u00edtima, manipulado, relativo a CVE_2009-2408.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4F46D5-85E5-4483-AD3D-207E9121FE3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3A6114-AA64-45E0-99D7-FAB060B8657B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCF67A1-874A-41A3-85C9-2BDCD193CE22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4321D25E-27DE-4649-A9B7-C6295F05ABB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25774954-E239-4337-9931-D4F6A69B42F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A000CAB-5986-4568-96C2-B7E213C77E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C5745B-2FFF-4DF8-883B-417015BDDF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A50325-2247-46EF-A991-70378C4D008F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58D1562-5A17-4124-8010-6098A204C898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C461E700-752D-4A31-A3A4-2B758CE07704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD8B6BE8-BC9A-443D-B6C8-4B5FF2390306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83681317-F32A-4C73-915A-D431E8DF944C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D9C492-5F87-4149-ACAE-948DBE35E40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70655CE0-63F0-402C-B335-FCFA494335C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6A6A05-E568-46F2-B2F5-73300E4EA5BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F102275D-8116-4F65-8910-478CB8DAAE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68C14C1-AFDF-4DE7-BD06-2A7FE079656D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD860AC-DE24-4CD5-B2C9-C77BD95AAFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403DDE56-5FA7-4920-A905-30349E61361B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F001A45E-CFD8-4B41-9281-F01A284ECD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580BAB7A-3BE0-4FA1-9CAF-124F16882518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21AE58E9-F201-41AA-A1DC-9EB09E50459A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C901C070-728C-41CD-8E4F-ECCB779906C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A1D7EA-6567-4A48-A431-EA28508D62C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D8F50B-495E-48B3-BF9F-8E4ACA556B2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00F4FFF6-6AB4-4857-BDFA-12801C972708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9987313-0256-4837-B347-6ABEF18DFCBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D703855E-6610-445D-B498-61CE1C763A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA7B64A2-6779-4A01-9864-902E2C04B08B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07B1635-6F28-4ED4-A2AC-CD7E9549C920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA4392F-2582-4EFE-9450-3F12588BE981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53E91EAD-3813-498B-9B5C-05F1DCF75D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CDDBC13-1646-490B-B778-DBD3BB3208C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B87F05D-C077-4929-8BBA-A7287A816470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DEC85E8-5555-46A9-9A95-30E1497AFA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA22553-089B-44D2-B545-82F7AED74E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03060364-7DCD-4111-BF7A-BEF6AFCB3134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319DADFB-081B-46AA-9F7D-DD4D1C5BE26D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9C6906-5FBD-4736-87B6-720E288E394A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4931FF86-51B6-470A-A2E0-A1B0942D1CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9DA33F-A33E-483E-AE4D-4422D62C02E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5028DB2-87D5-4AD8-87D4-325C519D6CD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E992CDB0-A787-4F7E-AC55-13FE7C68A1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808143C5-108B-45BE-B626-A44F9F956018\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EBBB3F1-98BD-40D1-B09F-1924D567625A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D5DAE5-ABEA-4FF1-836C-BA4741F13323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E15191F-D4E6-425C-81BE-2CD55A815B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0407CCC0-ACAA-4B2A-99A5-DA57791057B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"248D86F7-A8E5-448D-A55A-C05278BB9822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295EE8FF-18BD-4F67-9045-83A5693AB783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249C50ED-B681-4DFB-83CD-625D703CD95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3F060A3-FC8E-45CD-85AB-247D13A2896C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14BB81D-841D-456C-9CAE-CC679FFAB5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBA081D-AB88-4895-8495-6B51EB6B5325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F6B4C1-B88F-4675-BAB7-66A4DFAC17AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A44CE5AD-27B6-45EB-A0B8-CF9BDB31F0E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63984E6B-54EF-4DD6-8A5B-DD16A9A6A4B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBACF741-C988-4800-A9FF-E4836A1EE4E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95C5A868-2EC9-4FC6-A074-E587A203A350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:curl:libcurl:7.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54613E59-4583-405C-9BA3-609D47B9FFEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7DE39A-325D-42F5-B4ED-C971725232DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DEC10D0-622A-4037-9D4A-69814226CC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D0343C-175D-44BA-BCCF-5F204C749EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D4C0FC-6848-4D18-98E8-4A2F4D7BECC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E66EA58-F408-4D8B-9614-67B936B0F1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75BED785-BD7D-4A09-9B50-77548E64916D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A61633-B9B8-44B5-B352-29F4BFBD2BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACF6D258-2A8C-40C3-9171-4C4A5B22B30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB80911-5BD5-401D-8C0A-8229A71D0804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE508863-DB77-41D3-A438-3F26C34703E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B79E431-AD91-4269-B427-DD1169D12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479069C9-D3E5-4909-8368-0B0F4704810B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADB9299-3EFA-45E6-95BD-7FE2E1B1D565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libcurl:libcurl:7.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F93365-54FD-45D4-B878-13A53A6806A4\"}]}]}],\"references\":[{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20090812.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36238\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36475\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/45047\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://shibboleth.internet2.edu/secadv/secadv_20090817.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/506055/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/36032\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1158-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2263\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/52405\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20090812.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://shibboleth.internet2.edu/secadv/secadv_20090817.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/506055/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/36032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1158-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2263\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/52405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…