ID CVE-2007-6284
Summary The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
References
Vulnerable Configurations
  • Debian Debian Linux 3.1
    cpe:2.3:o:debian:debian_linux:3.1
  • cpe:2.3:o:debian:debian_linux:3.1:-:alpha
    cpe:2.3:o:debian:debian_linux:3.1:-:alpha
  • cpe:2.3:o:debian:debian_linux:3.1:-:amd64
    cpe:2.3:o:debian:debian_linux:3.1:-:amd64
  • cpe:2.3:o:debian:debian_linux:3.1:-:arm
    cpe:2.3:o:debian:debian_linux:3.1:-:arm
  • cpe:2.3:o:debian:debian_linux:3.1:-:hppa
    cpe:2.3:o:debian:debian_linux:3.1:-:hppa
  • cpe:2.3:o:debian:debian_linux:3.1:-:ia-32
    cpe:2.3:o:debian:debian_linux:3.1:-:ia-32
  • cpe:2.3:o:debian:debian_linux:3.1:-:ia-64
    cpe:2.3:o:debian:debian_linux:3.1:-:ia-64
  • cpe:2.3:o:debian:debian_linux:3.1:-:m68k
    cpe:2.3:o:debian:debian_linux:3.1:-:m68k
  • cpe:2.3:o:debian:debian_linux:3.1:-:mips
    cpe:2.3:o:debian:debian_linux:3.1:-:mips
  • cpe:2.3:o:debian:debian_linux:3.1:-:mipsel
    cpe:2.3:o:debian:debian_linux:3.1:-:mipsel
  • cpe:2.3:o:debian:debian_linux:3.1:-:ppc
    cpe:2.3:o:debian:debian_linux:3.1:-:ppc
  • cpe:2.3:o:debian:debian_linux:3.1:-:s-390
    cpe:2.3:o:debian:debian_linux:3.1:-:s-390
  • cpe:2.3:o:debian:debian_linux:3.1:-:sparc
    cpe:2.3:o:debian:debian_linux:3.1:-:sparc
  • Debian GNU/Linux 4.0
    cpe:2.3:o:debian:debian_linux:4.0
  • cpe:2.3:o:debian:debian_linux:4.0:-:alpha
    cpe:2.3:o:debian:debian_linux:4.0:-:alpha
  • cpe:2.3:o:debian:debian_linux:4.0:-:amd64
    cpe:2.3:o:debian:debian_linux:4.0:-:amd64
  • cpe:2.3:o:debian:debian_linux:4.0:-:arm
    cpe:2.3:o:debian:debian_linux:4.0:-:arm
  • cpe:2.3:o:debian:debian_linux:4.0:-:hppa
    cpe:2.3:o:debian:debian_linux:4.0:-:hppa
  • cpe:2.3:o:debian:debian_linux:4.0:-:ia-32
    cpe:2.3:o:debian:debian_linux:4.0:-:ia-32
  • cpe:2.3:o:debian:debian_linux:4.0:-:ia-64
    cpe:2.3:o:debian:debian_linux:4.0:-:ia-64
  • cpe:2.3:o:debian:debian_linux:4.0:-:m68k
    cpe:2.3:o:debian:debian_linux:4.0:-:m68k
  • cpe:2.3:o:debian:debian_linux:4.0:-:mips
    cpe:2.3:o:debian:debian_linux:4.0:-:mips
  • cpe:2.3:o:debian:debian_linux:4.0:-:mipsel
    cpe:2.3:o:debian:debian_linux:4.0:-:mipsel
  • cpe:2.3:o:debian:debian_linux:4.0:-:powerpc
    cpe:2.3:o:debian:debian_linux:4.0:-:powerpc
  • cpe:2.3:o:debian:debian_linux:4.0:-:s-390
    cpe:2.3:o:debian:debian_linux:4.0:-:s-390
  • cpe:2.3:o:debian:debian_linux:4.0:-:sparc
    cpe:2.3:o:debian:debian_linux:4.0:-:sparc
  • MandrakeSoft Mandrake Linux 2007.0
    cpe:2.3:o:mandrakesoft:mandrake_linux:2007
  • cpe:2.3:o:mandrakesoft:mandrake_linux:2007:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux:2007:-:x86_64
  • MandrakeSoft Mandrake Linux 2007.1
    cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1
  • cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:-:x86_64
  • MandrakeSoft Mandrake Linux 2008.0
    cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0
  • cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:-:x86_64
  • MandrakeSoft Mandrake Corporate Server 3.0
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
  • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:-:x86_64
  • MandrakeSoft Mandrake Corporate Server 4.0
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0
  • cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:-:x86_64
    cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:-:x86_64
  • Fedora 7
    cpe:2.3:o:redhat:fedora:7
  • Red Hat fedora 8
    cpe:2.3:o:redhat:fedora:8
CVSS
Base: 5.0 (as of 14-01-2008 - 09:49)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Windows
    NASL id VLC_0_8_6H.NASL
    description The version of VLC Media Player installed on the remote host reportedly includes versions of GnuTLS, libgcrypt, and libxml2 that are affected by various denial of service and buffer overflow vulnerabilities.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 33278
    published 2008-06-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=33278
    title VLC Media Player < 0.8.6h Multiple Vulnerabilities
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2008-0032.NASL
    description From Red Hat Security Advisory 2008:0032 : Updated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67637
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67637
    title Oracle Linux 3 / 4 / 5 : libxml2 (ELSA-2008-0032)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2008-010.NASL
    description A denial of service flaw was discovered by the Google Security Team in the way libxml2 processes malformed XML content. This flaw could cause the application to stop responding. The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 36842
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36842
    title Mandriva Linux Security Advisory : libxml2 (MDVSA-2008:010)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0032.NASL
    description Updated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 29954
    published 2008-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29954
    title RHEL 2.1 / 3 / 4 / 5 : libxml2 (RHSA-2008:0032)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20080111_LIBXML2_ON_SL3_X.NASL
    description A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284)
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60342
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60342
    title Scientific Linux Security Update : libxml2 on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2008-0006.NASL
    description Updated libxml2 package to address a denial of service flaw. Thanks to the Google security team for identifying and reporting this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-6284 to this issue.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 40376
    published 2009-07-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40376
    title VMSA-2008-0006 : Updated libxml2 service console package
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2009-0018.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Add bug347316.patch to backport fix for bug#347316 from upstream version - Add libxml2-enterprise.patch and update logos in tarball - Fix a couple of crash (CVE-2009-2414, CVE-2009-2416) - Resolves: rhbz#515236 - two patches for size overflows problems (CVE-2008-4225, CVE-2008-4226) - Resolves: rhbz#470474 - Patch to fix an entity name copy buffer overflow (CVE-2008-3529) - Resolves: rhbz#461023 - Better fix for (CVE-2008-3281) - Resolves: rhbz#458095 - change the patch for CVE-2008-3281 due to ABI issues - Resolves: rhbz#458095 - Patch to fix recursive entities handling (CVE-2008-3281) - Resolves: rhbz#458095 - Patch to fix UTF-8 decoding problem (CVE-2007-6284) - Resolves: rhbz#425933
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 79462
    published 2014-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79462
    title OracleVM 2.1 : libxml2 (OVMSA-2009-0018)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-0477.NASL
    description This release fixes a potential Denial of Service attack on services using libxml2 to parse user provided XML. All users are invited to upgrade. Fixes CVE-2007-6284 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 29943
    published 2008-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29943
    title Fedora 7 : libxml2-2.6.31-1.fc7 (2008-0477)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1461.NASL
    description Brad Fitzpatrick discovered that the UTF-8 decoding functions of libxml2, the GNOME XML library, validate UTF-8 correctness insufficiently, which may lead to denial of service by forcing libxml2 into an infinite loop.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 29938
    published 2008-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29938
    title Debian DSA-1461-1 : libxml2 - missing input validation
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2008-0032.NASL
    description Updated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 29932
    published 2008-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29932
    title CentOS 3 / 4 / 5 : libxml2 (CESA-2008:0032)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBXML2-4841.NASL
    description libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem.
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 30095
    published 2008-01-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=30095
    title openSUSE 10 Security Update : libxml2 (libxml2-4841)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-0462.NASL
    description This release fixes a potential Denial of Service attack on services using libxml2 to parse user provided XML. All users are invited to upgrade. Fixes CVE-2007-6284 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 29940
    published 2008-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29940
    title Fedora 8 : libxml2-2.6.31-1.fc8 (2008-0462)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBXML2-4840.NASL
    description libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem.
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 30094
    published 2008-01-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=30094
    title SuSE 10 Security Update : libxml2 (ZYPP Patch Number 4840)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200801-20.NASL
    description The remote host is affected by the vulnerability described in GLSA-200801-20 (libxml2: Denial of Service) Brad Fitzpatrick reported that the xmlCurrentChar() function does not properly handle some UTF-8 multibyte encodings. Impact : A remote attacker could entice a user to open a specially crafted XML document with an application using libxml2, possibly resulting in a high CPU consumption. Note that this vulnerability could also be triggered without user interaction by an automated system processing XML content. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 30137
    published 2008-02-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=30137
    title GLSA-200801-20 : libxml2: Denial of Service
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-569-1.NASL
    description Brad Fitzpatrick discovered that libxml2 did not correctly handle certain UTF-8 sequences. If a remote attacker were able to trick a user or automated system into processing a specially crafted XML document, the application linked against libxml2 could enter an infinite loop, leading to a denial of service via CPU resource consumption. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 29979
    published 2008-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29979
    title Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : libxml2 vulnerability (USN-569-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12032.NASL
    description libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem.
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 41179
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41179
    title SuSE9 Security Update : libxml2 (YOU Patch Number 12032)
oval via4
  • accepted 2013-04-29T04:14:51.422-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    family unix
    id oval:org.mitre.oval:def:11594
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    version 24
  • accepted 2008-03-24T04:00:40.950-04:00
    class vulnerability
    contributors
    name Pai Peng
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 9 (SPARC) is installed
      oval oval:org.mitre.oval:def:1457
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 9 (x86) is installed
      oval oval:org.mitre.oval:def:1683
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    family unix
    id oval:org.mitre.oval:def:5216
    status accepted
    submitted 2008-02-12T08:48:33.000-05:00
    title Security Vulnerability in the libxml2 Library May Lead to a Denial of Service (DoS)
    version 32
redhat via4
advisories
bugzilla
id 425927
title CVE-2007-6284 libxml2: infinite loop in UTF-8 decoding
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 3 is installed
      oval oval:com.redhat.rhsa:tst:20060015001
    • OR
      • AND
        • comment libxml2 is earlier than 0:2.5.10-8
          oval oval:com.redhat.rhsa:tst:20080032002
        • comment libxml2 is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032003
      • AND
        • comment libxml2-devel is earlier than 0:2.5.10-8
          oval oval:com.redhat.rhsa:tst:20080032004
        • comment libxml2-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032005
      • AND
        • comment libxml2-python is earlier than 0:2.5.10-8
          oval oval:com.redhat.rhsa:tst:20080032006
        • comment libxml2-python is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032007
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhsa:tst:20060016001
    • OR
      • AND
        • comment libxml2 is earlier than 0:2.6.16-10.1
          oval oval:com.redhat.rhsa:tst:20080032009
        • comment libxml2 is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032003
      • AND
        • comment libxml2-devel is earlier than 0:2.6.16-10.1
          oval oval:com.redhat.rhsa:tst:20080032010
        • comment libxml2-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032005
      • AND
        • comment libxml2-python is earlier than 0:2.6.16-10.1
          oval oval:com.redhat.rhsa:tst:20080032011
        • comment libxml2-python is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20080032007
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment libxml2 is earlier than 0:2.6.26-2.1.2.1
          oval oval:com.redhat.rhsa:tst:20080032013
        • comment libxml2 is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080032014
      • AND
        • comment libxml2-devel is earlier than 0:2.6.26-2.1.2.1
          oval oval:com.redhat.rhsa:tst:20080032015
        • comment libxml2-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080032016
      • AND
        • comment libxml2-python is earlier than 0:2.6.26-2.1.2.1
          oval oval:com.redhat.rhsa:tst:20080032017
        • comment libxml2-python is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080032018
rhsa
id RHSA-2008:0032
released 2008-01-11
severity Important
title RHSA-2008:0032: libxml2 security update (Important)
rpms
  • libxml2-0:2.5.10-8
  • libxml2-devel-0:2.5.10-8
  • libxml2-python-0:2.5.10-8
  • libxml2-0:2.6.16-10.1
  • libxml2-devel-0:2.6.16-10.1
  • libxml2-python-0:2.6.16-10.1
  • libxml2-0:2.6.26-2.1.2.1
  • libxml2-devel-0:2.6.26-2.1.2.1
  • libxml2-python-0:2.6.26-2.1.2.1
refmap via4
apple APPLE-SA-2008-07-11
bid 27248
bugtraq
  • 20080115 rPSA-2008-0017-1 libxml2
  • 20080329 VMSA-2008-0006 Updated libxml2 service console package
confirm
debian DSA-1461
fedora
  • FEDORA-2008-0462
  • FEDORA-2008-0477
gentoo GLSA-200801-20
mandriva MDVSA-2008:010
misc https://bugzilla.redhat.com/show_bug.cgi?id=425927
mlist
  • [Security-announce] 20080328 VMSA-2008-0006 Updated libxml2 service console package
  • [xml] 20080111 Security flaw affecting all previous libxml2 releases
sectrack 1019181
secunia
  • 28439
  • 28444
  • 28450
  • 28452
  • 28458
  • 28466
  • 28470
  • 28475
  • 28636
  • 28716
  • 28740
  • 29591
  • 31074
sunalert
  • 103201
  • 201514
suse SUSE-SR:2008:002
ubuntu USN-569-1
vupen
  • ADV-2008-0117
  • ADV-2008-0144
  • ADV-2008-1033
  • ADV-2008-2094
Last major update 07-03-2011 - 22:02
Published 11-01-2008 - 21:46
Last modified 15-10-2018 - 17:51
Back to Top