var-200911-0398
Vulnerability from variot

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue. A vulnerability exists in SSL and TLS protocols that may allow attackers to execute an arbitrary HTTP transaction. ----------------------------------------------------------------------

http://secunia.com/research/

http://secunia.com/company/jobs/open_positions/reverse_engineer


TITLE: Oracle Application Server Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA44293

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44293/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44293

RELEASE DATE: 2011-04-24

DISCUSS ADVISORY: http://secunia.com/advisories/44293/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/44293/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=44293

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Multiple vulnerabilities have been reported in Oracle Application Server, which can be exploited by malicious users and people to manipulate certain data.

1) An error exists in the C Oracle SSL API of the Oracle Security Service component and can be exploited to manipulate certain data.

For more information see vulnerability #1: SA37291

2) An unspecified error in the Oracle HTTP Server component can be exploited to manipulate certain data.

3) An error exists in the Midtier Infrastructure of the Portal component and can be exploited to manipulate certain data.

For more information see vulnerability #3: SA44246

4) An unspecified error in the Single Sign On component can be exploited by authenticated users to manipulate certain data.

The vulnerabilities are reported in the following products: * Oracle Application Server 10g Release 2 version 10.1.2.3.0. * Oracle Application Server 10g Release 3 version 10.1.3.5.0.

SOLUTION: Apply updates (please see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: It is currently unclear who reported these vulnerabilities as the Oracle Critical Patch Update for April 2011 only provides a bundled list of credits. This section will be updated when/if the original reporter provides more information.

ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html#AppendixAS

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. Corrected: 2009-12-03 09:18:40 UTC (RELENG_8, 8.0-STABLE) 2009-12-03 09:18:40 UTC (RELENG_8_0, 8.0-RELEASE-p1) 2009-12-03 09:18:40 UTC (RELENG_7, 7.2-STABLE) 2009-12-03 09:18:40 UTC (RELENG_7_2, 7.2-RELEASE-p5) 2009-12-03 09:18:40 UTC (RELENG_7_1, 7.1-RELEASE-p9) 2009-12-03 09:18:40 UTC (RELENG_6, 6.4-STABLE) 2009-12-03 09:18:40 UTC (RELENG_6_4, 6.4-RELEASE-p8) 2009-12-03 09:18:40 UTC (RELENG_6_3, 6.3-RELEASE-p14) CVE Name: CVE-2009-3555

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . Background

The SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols provide a secure communications layer over which other protocols can be utilized. The most widespread use of SSL/TLS is to add security to the HTTP protocol, thus producing HTTPS.

FreeBSD includes software from the OpenSSL Project which implements SSL and TLS.

II. Problem Description

The SSL version 3 and TLS protocols support session renegotiation without cryptographically tying the new session parameters to the old parameters.

III. Impact

An attacker who can intercept a TCP connection being used for SSL or TLS can cause the initial session negotiation to take the place of a session renegotiation. This can be exploited in several ways, including: * Causing a server to interpret incoming messages as having been sent under the auspices of a client SSL key when in fact they were not; * Causing a client request to be appended to an attacker-supplied request, potentially revealing to the attacker the contents of the client request (including any authentication parameters); and * Causing a client to receive a response to an attacker-supplied request instead of a response to the request sent by the client.

IV. Workaround

No workaround is available. Solution

NOTE WELL: This update causes OpenSSL to reject any attempt to renegotiate SSL / TLS session parameters. As a result, connections in which the other party attempts to renegotiate session parameters will break. In practice, however, session renegotiation is a rarely-used feature, so disabling this functionality is unlikely to cause problems for most systems.

Perform one of the following:

1) Upgrade your vulnerable system to 6-STABLE, 7-STABLE, or 8-STABLE, or to the RELENG_8_0, RELENG_7_2, RELENG_7_1, RELENG_6_4, or RELENG_6_3 security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 6.3, 6.4, 7.1, 7.2, and 8.0 systems.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

fetch http://security.FreeBSD.org/patches/SA-09:15/ssl.patch

fetch http://security.FreeBSD.org/patches/SA-09:15/ssl.patch.asc

b) Execute the following commands as root:

cd /usr/src

patch < /path/to/patch

cd /usr/src/secure/lib/libcrypto

make obj && make depend && make includes && make && make install

NOTE: On the amd64 platform, the above procedure will not update the lib32 (i386 compatibility) libraries. On amd64 systems where the i386 compatibility libraries are used, the operating system should instead be recompiled as described in

VI. Correction details

The following list contains the revision numbers of each file that was corrected in FreeBSD.

CVS:

Branch Revision Path


RELENG_6 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.10.2.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.2.3 src/crypto/openssl/ssl/s3_lib.c 1.1.1.10.2.1 RELENG_6_4 src/UPDATING 1.416.2.40.2.12 src/sys/conf/newvers.sh 1.69.2.18.2.14 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.10.12.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.2.1.6.2 src/crypto/openssl/ssl/s3_lib.c 1.1.1.10.12.1 RELENG_6_3 src/UPDATING 1.416.2.37.2.19 src/sys/conf/newvers.sh 1.69.2.15.2.18 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.10.10.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.2.1.4.2 src/crypto/openssl/ssl/s3_lib.c 1.1.1.10.10.1 RELENG_7 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.12.2.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.17.2.2 src/crypto/openssl/ssl/s3_lib.c 1.1.1.13.2.1 RELENG_7_2 src/UPDATING 1.507.2.23.2.8 src/sys/conf/newvers.sh 1.72.2.11.2.9 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.12.8.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.17.2.1.2.1 src/crypto/openssl/ssl/s3_lib.c 1.1.1.13.8.1 RELENG_7_1 src/UPDATING 1.507.2.13.2.12 src/sys/conf/newvers.sh 1.72.2.9.2.13 src/crypto/openssl/ssl/s3_pkt.c 1.1.1.12.6.1 src/crypto/openssl/ssl/s3_srvr.c 1.1.1.17.6.2 src/crypto/openssl/ssl/s3_lib.c 1.1.1.13.6.1 RELENG_8 src/crypto/openssl/ssl/s3_pkt.c 1.2.2.1 src/crypto/openssl/ssl/s3_srvr.c 1.3.2.1 src/crypto/openssl/ssl/s3_lib.c 1.2.2.1 RELENG_8_0 src/UPDATING 1.632.2.7.2.4 src/sys/conf/newvers.sh 1.83.2.6.2.4 src/crypto/openssl/ssl/s3_pkt.c 1.2.4.1 src/crypto/openssl/ssl/s3_srvr.c 1.3.4.1 src/crypto/openssl/ssl/s3_lib.c 1.2.4.1


Subversion:

Branch/path Revision


stable/6/ r200054 releng/6.4/ r200054 releng/6.3/ r200054 stable/7/ r200054 releng/7.2/ r200054 releng/7.1/ r200054


VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


               VMware Security Advisory

Advisory ID: VMSA-2010-0019 Synopsis: VMware ESX third party updates for Service Console Issue date: 2010-12-07 Updated on: 2010-12-07 CVE numbers: CVE-2010-3069 CVE-2010-0405 CVE-2009-0590 CVE-2009-2409 CVE-2009-3555


  1. Summary

ESX 3.x Console OS (COS) updates for samba, bzip2, and openssl packages.

  1. Relevant releases

VMware ESX 3.5 without patches ESX350-201012408-SG, ESX350-201012409-SG, ESX350-201012401-SG

Notes: Effective May 2010, VMware's patch and update release program during Extended Support will be continued with the condition that all subsequent patch and update releases will be based on the latest baseline release version as of May 2010 (i.e. ESX 3.0.3 Update 1, ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section "End of Product Availability FAQs" at http://www.vmware.com/support/policies/lifecycle/vi/faq.html for details.

Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan to upgrade to at least ESX 3.5 and preferably to the newest release available.

  1. Problem Description

a. Service Console update for samba

The service console package samba is updated to version
3.0.9-1.3E.18.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-3069 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted *       any       any      not affected

ESXi           any       ESXi     not affected

ESX            4.1       ESX      not applicable
ESX            4.0       ESX      not applicable
ESX            3.5       ESX      ESX350-201012408-SG
ESX            3.0.3     ESX      affected, patch pending
  • hosted products are VMware Workstation, Player, ACE, Server, Fusion.

b. Service Console update for bzip2

The service console package bzip2 updated to version
1.0.2-14.EL3.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-0405 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted *       any       any      not affected

ESXi           any       ESXi     not affected

ESX            4.1       ESX      affected, patch pending
ESX            4.0       ESX      affected, patch pending
ESX            3.5       ESX      ESX350-201012409-SG
ESX            3.0.3     ESX      affected, patch pending
  • hosted products are VMware Workstation, Player, ACE, Server, Fusion.

c. Service Console update for OpenSSL

The service console package openssl updated to version
0.9.7a-33.26.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-0590, CVE-2009-2409 and
CVE-2009-3555 to the issues addressed in this update.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted *       any       any      not affected

ESXi           any       ESXi     not affected

ESX            4.1       ESX      not applicable
ESX            4.0       ESX      not applicable
ESX            3.5       ESX      ESX350-201012401-SG
ESX            3.0.3     ESX      affected, no patch planned
  • hosted products are VMware Workstation, Player, ACE, Server, Fusion.

  • Solution

Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.

ESX 3.5


Samba http://download3.vmware.com/software/vi/ESX350-201012408-SG.zip md5sum: 53a427d5d2213c51d57e8e8f7e3d544c http://kb.vmware.com/kb/1029999

bzip http://download3.vmware.com/software/vi/ESX350-201012409-SG.zip md5sum: 0a688d7153380fcb5d7ca0ac098e2d03 http://kb.vmware.com/kb/1030000

openssl http://download3.vmware.com/software/vi/ESX350-201012401-SG.zip md5sum: a8b1d9e4eabd14b6822bd1f8bf6dbf69 http://kb.vmware.com/kb/1029993

  1. References

CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555


  1. Change log

2010-12-07 VMSA-2010-0019 Initial security advisory after release of patches for ESX 3.5 on 2010-12-07


  1. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  • security-announce at lists.vmware.com
  • bugtraq at securityfocus.com
  • full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center http://www.vmware.com/security

VMware Security Advisories http://www.vmware.com/security/advisories

VMware security response policy http://www.vmware.com/support/policies/security_response.html

General support life cycle policy http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8

wj8DBQFM/f4zS2KysvBH1xkRAnf/AJ92iaWdMkFZqrc8it1+wGuNzhfN1ACfegvo 1g3OQEfuUNoDQXhCp3zHpw4= =FmAq -----END PGP SIGNATURE----- . This update addresses these protocol vulnerabilities in lighttpd.

CVE-2009-3555

Marsh Ray, Steve Dispensa, and Martin Rex discovered that the TLS and SSLv3 protocols do not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions. This issue is solved in lighttpd by disabling client initiated renegotiation by default.

Those users that do actually need such renegotiations, can reenable them via the new 'ssl.disable-client-renegotiation' parameter.

CVE-2012-4929

Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL protocol when using compression. This side channel attack, dubbed 'CRIME', allows eavesdroppers to gather information to recover the original plaintext in the protocol. This update disables compression.

For the stable distribution (squeeze), these problems have been fixed in version 1.4.28-2+squeeze1.2.

For the testing distribution (wheezy), and the unstable distribution (sid) these problems have been fixed in version 1.4.30-1.

We recommend that you upgrade your lighttpd packages.

For Debian 7 (wheezy) this update adds a missing part to make it actually possible to disable client-initiated renegotiation and disables it by default (CVE-2009-3555). TLS compression is disabled (CVE-2012-4929), although this is normally already disabled by the OpenSSL system library. Finally it adds the ability to disable the SSLv3 protocol (CVE-2014-3566) entirely via the new "DisableSSLv3" configuration directive, although it will not disabled by default in this update. Additionally a non-security sensitive issue in redirect encoding is addressed.

For Debian 8 (jessie) these issues have been fixed prior to the release, with the exception of client-initiated renegotiation (CVE-2009-3555)

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200911-0398",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "9.10"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "8.04"
      },
      {
        "model": "openssl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openssl",
        "version": "1.0"
      },
      {
        "model": "gnutls",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.8.5"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "12"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "10.04"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "13"
      },
      {
        "model": "nginx",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "0.1.0"
      },
      {
        "model": "nginx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "0.8.22"
      },
      {
        "model": "nss",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mozilla",
        "version": "3.12.4"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "10.10"
      },
      {
        "model": "http server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apache",
        "version": "2.2.14"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "8.10"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "9.04"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "14"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "11"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "5.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "7.0"
      },
      {
        "model": "openssl",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "openssl",
        "version": "0.9.8k"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "4.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "barracuda",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gnutls",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mcafee",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Debian",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "db": "PACKETSTORM",
        "id": "131826"
      }
    ],
    "trust": 0.2
  },
  "cve": "CVE-2009-3555",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-3555",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-41001",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-3555",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-3555",
            "trust": 0.8,
            "value": "0"
          },
          {
            "author": "VULHUB",
            "id": "VHN-41001",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue. A vulnerability exists in SSL and TLS protocols that may allow attackers to execute an arbitrary HTTP transaction. ----------------------------------------------------------------------\n\n\nhttp://secunia.com/research/\n\nhttp://secunia.com/company/jobs/open_positions/reverse_engineer\n\n\n----------------------------------------------------------------------\n\nTITLE:\nOracle Application Server Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA44293\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44293/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44293\n\nRELEASE DATE:\n2011-04-24\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44293/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44293/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44293\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Oracle Application\nServer, which can be exploited by malicious users and people to\nmanipulate certain data. \n\n1) An error exists in the C Oracle SSL API of the Oracle Security\nService component and can be exploited to manipulate certain data. \n\nFor more information see vulnerability #1:\nSA37291\n\n2) An unspecified error in the Oracle HTTP Server component can be\nexploited to manipulate certain data. \n\n3) An error exists in the Midtier Infrastructure of the Portal\ncomponent and can be exploited to manipulate certain data. \n\nFor more information see vulnerability #3:\nSA44246\n\n4) An unspecified error in the Single Sign On component can be\nexploited by authenticated users to manipulate certain data. \n\nThe vulnerabilities are reported in the following products:\n* Oracle Application Server 10g Release 2 version 10.1.2.3.0. \n* Oracle Application Server 10g Release 3 version 10.1.3.5.0. \n\nSOLUTION:\nApply updates (please see the vendor\u0027s advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nIt is currently unclear who reported these vulnerabilities as the\nOracle Critical Patch Update for April 2011 only provides a bundled\nlist of credits. This section will be updated when/if the original\nreporter provides more information. \n\nORIGINAL ADVISORY:\nOracle:\nhttp://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html#AppendixAS\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \nCorrected:      2009-12-03 09:18:40 UTC (RELENG_8, 8.0-STABLE)\n                2009-12-03 09:18:40 UTC (RELENG_8_0, 8.0-RELEASE-p1)\n                2009-12-03 09:18:40 UTC (RELENG_7, 7.2-STABLE)\n                2009-12-03 09:18:40 UTC (RELENG_7_2, 7.2-RELEASE-p5)\n                2009-12-03 09:18:40 UTC (RELENG_7_1, 7.1-RELEASE-p9)\n                2009-12-03 09:18:40 UTC (RELENG_6, 6.4-STABLE)\n                2009-12-03 09:18:40 UTC (RELENG_6_4, 6.4-RELEASE-p8)\n                2009-12-03 09:18:40 UTC (RELENG_6_3, 6.3-RELEASE-p14)\nCVE Name:       CVE-2009-3555\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:http://security.FreeBSD.org/\u003e.   Background\n\nThe SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols\nprovide a secure communications layer over which other protocols can be\nutilized.  The most widespread use of SSL/TLS is to add security to the\nHTTP protocol, thus producing HTTPS. \n\nFreeBSD includes software from the OpenSSL Project which implements SSL\nand TLS. \n\nII.  Problem Description\n\nThe SSL version 3 and TLS protocols support session renegotiation without\ncryptographically tying the new session parameters to the old parameters. \n\nIII. Impact\n\nAn attacker who can intercept a TCP connection being used for SSL or TLS\ncan cause the initial session negotiation to take the place of a session\nrenegotiation.  This can be exploited in several ways, including:\n * Causing a server to interpret incoming messages as having been sent\nunder the auspices of a client SSL key when in fact they were not;\n * Causing a client request to be appended to an attacker-supplied\nrequest, potentially revealing to the attacker the contents of the client\nrequest (including any authentication parameters); and\n * Causing a client to receive a response to an attacker-supplied request\ninstead of a response to the request sent by the client. \n\nIV.  Workaround\n\nNo workaround is available.   Solution\n\nNOTE WELL: This update causes OpenSSL to reject any attempt to renegotiate\nSSL / TLS session parameters.  As a result, connections in which the other\nparty attempts to renegotiate session parameters will break.  In practice,\nhowever, session renegotiation is a rarely-used feature, so disabling this\nfunctionality is unlikely to cause problems for most systems. \n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to 6-STABLE, 7-STABLE, or 8-STABLE, or to\nthe RELENG_8_0, RELENG_7_2, RELENG_7_1, RELENG_6_4, or RELENG_6_3 security\nbranch dated after the correction date. \n\n2) To patch your present system:\n\nThe following patches have been verified to apply to FreeBSD 6.3, 6.4,\n7.1, 7.2, and 8.0 systems. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n# fetch http://security.FreeBSD.org/patches/SA-09:15/ssl.patch\n# fetch http://security.FreeBSD.org/patches/SA-09:15/ssl.patch.asc\n\nb) Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n# cd /usr/src/secure/lib/libcrypto\n# make obj \u0026\u0026 make depend \u0026\u0026 make includes \u0026\u0026 make \u0026\u0026 make install\n\nNOTE: On the amd64 platform, the above procedure will not update the\nlib32 (i386 compatibility) libraries.  On amd64 systems where the i386\ncompatibility libraries are used, the operating system should instead\nbe recompiled as described in\n\u003cURL:http://www.FreeBSD.org/handbook/makeworld.html\u003e\n\nVI.  Correction details\n\nThe following list contains the revision numbers of each file that was\ncorrected in FreeBSD. \n\nCVS:\n\nBranch                                                           Revision\n  Path\n- -------------------------------------------------------------------------\nRELENG_6\n  src/crypto/openssl/ssl/s3_pkt.c                            1.1.1.10.2.1\n  src/crypto/openssl/ssl/s3_srvr.c                           1.1.1.14.2.3\n  src/crypto/openssl/ssl/s3_lib.c                            1.1.1.10.2.1\nRELENG_6_4\n  src/UPDATING                                            1.416.2.40.2.12\n  src/sys/conf/newvers.sh                                  1.69.2.18.2.14\n  src/crypto/openssl/ssl/s3_pkt.c                           1.1.1.10.12.1\n  src/crypto/openssl/ssl/s3_srvr.c                       1.1.1.14.2.1.6.2\n  src/crypto/openssl/ssl/s3_lib.c                           1.1.1.10.12.1\nRELENG_6_3\n  src/UPDATING                                            1.416.2.37.2.19\n  src/sys/conf/newvers.sh                                  1.69.2.15.2.18\n  src/crypto/openssl/ssl/s3_pkt.c                           1.1.1.10.10.1\n  src/crypto/openssl/ssl/s3_srvr.c                       1.1.1.14.2.1.4.2\n  src/crypto/openssl/ssl/s3_lib.c                           1.1.1.10.10.1\nRELENG_7\n  src/crypto/openssl/ssl/s3_pkt.c                            1.1.1.12.2.1\n  src/crypto/openssl/ssl/s3_srvr.c                           1.1.1.17.2.2\n  src/crypto/openssl/ssl/s3_lib.c                            1.1.1.13.2.1\nRELENG_7_2\n  src/UPDATING                                             1.507.2.23.2.8\n  src/sys/conf/newvers.sh                                   1.72.2.11.2.9\n  src/crypto/openssl/ssl/s3_pkt.c                            1.1.1.12.8.1\n  src/crypto/openssl/ssl/s3_srvr.c                       1.1.1.17.2.1.2.1\n  src/crypto/openssl/ssl/s3_lib.c                            1.1.1.13.8.1\nRELENG_7_1\n  src/UPDATING                                            1.507.2.13.2.12\n  src/sys/conf/newvers.sh                                   1.72.2.9.2.13\n  src/crypto/openssl/ssl/s3_pkt.c                            1.1.1.12.6.1\n  src/crypto/openssl/ssl/s3_srvr.c                           1.1.1.17.6.2\n  src/crypto/openssl/ssl/s3_lib.c                            1.1.1.13.6.1\nRELENG_8\n  src/crypto/openssl/ssl/s3_pkt.c                                 1.2.2.1\n  src/crypto/openssl/ssl/s3_srvr.c                                1.3.2.1\n  src/crypto/openssl/ssl/s3_lib.c                                 1.2.2.1\nRELENG_8_0\n  src/UPDATING                                              1.632.2.7.2.4\n  src/sys/conf/newvers.sh                                    1.83.2.6.2.4\n  src/crypto/openssl/ssl/s3_pkt.c                                 1.2.4.1\n  src/crypto/openssl/ssl/s3_srvr.c                                1.3.4.1\n  src/crypto/openssl/ssl/s3_lib.c                                 1.2.4.1\n- -------------------------------------------------------------------------\n\nSubversion:\n\nBranch/path                                                      Revision\n- -------------------------------------------------------------------------\nstable/6/                                                         r200054\nreleng/6.4/                                                       r200054\nreleng/6.3/                                                       r200054\nstable/7/                                                         r200054\nreleng/7.2/                                                       r200054\nreleng/7.1/                                                       r200054\n- -------------------------------------------------------------------------\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n                   VMware Security Advisory\n\nAdvisory ID:       VMSA-2010-0019\nSynopsis:          VMware ESX third party updates for Service Console\nIssue date:        2010-12-07\nUpdated on:        2010-12-07\nCVE numbers:       CVE-2010-3069 CVE-2010-0405 CVE-2009-0590\n                   CVE-2009-2409 CVE-2009-3555\n- ------------------------------------------------------------------------\n\n1. Summary\n\n   ESX 3.x Console OS (COS) updates for samba, bzip2, and openssl\n   packages. \n\n2. Relevant releases\n\n   VMware ESX 3.5 without patches ESX350-201012408-SG,\n   ESX350-201012409-SG, ESX350-201012401-SG\n\n   Notes:\n   Effective May 2010, VMware\u0027s patch and update release program during\n   Extended Support will be continued with the condition that all\n   subsequent patch and update releases will be based on the latest\n   baseline release version as of May 2010 (i.e. ESX 3.0.3 Update 1,\n   ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section\n   \"End of Product Availability FAQs\" at\n   http://www.vmware.com/support/policies/lifecycle/vi/faq.html for\n   details. \n\n   Extended support for ESX 3.0.3 ends on 2011-12-10.  Users should plan\n   to upgrade to at least ESX 3.5 and preferably to the newest release\n   available. \n\n3. Problem Description\n\n a. Service Console update for samba\n\n    The service console package samba is updated to version\n    3.0.9-1.3E.18. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2010-3069 to this issue. \n\n    Column 4 of the following table lists the action required to\n    remediate the vulnerability in each release, if a solution is\n    available.  \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted *       any       any      not affected\n\n    ESXi           any       ESXi     not affected\n\n    ESX            4.1       ESX      not applicable\n    ESX            4.0       ESX      not applicable\n    ESX            3.5       ESX      ESX350-201012408-SG\n    ESX            3.0.3     ESX      affected, patch pending\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Service Console update for bzip2\n\n    The service console package bzip2 updated to version\n    1.0.2-14.EL3. \n   \n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2010-0405 to this issue. \n\n    Column 4 of the following table lists the action required to\n    remediate the vulnerability in each release, if a solution is\n    available.  \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted *       any       any      not affected\n\n    ESXi           any       ESXi     not affected\n\n    ESX            4.1       ESX      affected, patch pending\n    ESX            4.0       ESX      affected, patch pending\n    ESX            3.5       ESX      ESX350-201012409-SG\n    ESX            3.0.3     ESX      affected, patch pending\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Service Console update for OpenSSL\n\n    The service console package openssl updated to version\n    0.9.7a-33.26. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2009-0590, CVE-2009-2409 and\n    CVE-2009-3555 to the issues addressed in this update. \n\n    Column 4 of the following table lists the action required to\n    remediate the vulnerability in each release, if a solution is\n    available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted *       any       any      not affected\n\n    ESXi           any       ESXi     not affected\n\n    ESX            4.1       ESX      not applicable\n    ESX            4.0       ESX      not applicable\n    ESX            3.5       ESX      ESX350-201012401-SG\n    ESX            3.0.3     ESX      affected, no patch planned\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n   Please review the patch/release notes for your product and version\n   and verify the md5sum of your downloaded file. \n\n   ESX 3.5\n   -------\n\n   Samba\n   http://download3.vmware.com/software/vi/ESX350-201012408-SG.zip\n   md5sum: 53a427d5d2213c51d57e8e8f7e3d544c\n   http://kb.vmware.com/kb/1029999\n   \n   bzip\n   http://download3.vmware.com/software/vi/ESX350-201012409-SG.zip\n   md5sum: 0a688d7153380fcb5d7ca0ac098e2d03\n   http://kb.vmware.com/kb/1030000\n   \n   openssl\n   http://download3.vmware.com/software/vi/ESX350-201012401-SG.zip\n   md5sum: a8b1d9e4eabd14b6822bd1f8bf6dbf69\n   http://kb.vmware.com/kb/1029993\n\n\n5. References\n\n   CVE numbers\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555\n\n- ------------------------------------------------------------------------\n\n6. Change log\n\n2010-12-07  VMSA-2010-0019\nInitial security advisory after release of patches for ESX 3.5\non 2010-12-07\n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n  * security-announce at lists.vmware.com\n  * bugtraq at securityfocus.com\n  * full-disclosure at lists.grok.org.uk\n\nE-mail:  security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware Security Advisories\nhttp://www.vmware.com/security/advisories\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2010 VMware Inc.  All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFM/f4zS2KysvBH1xkRAnf/AJ92iaWdMkFZqrc8it1+wGuNzhfN1ACfegvo\n1g3OQEfuUNoDQXhCp3zHpw4=\n=FmAq\n-----END PGP SIGNATURE-----\n. This\nupdate addresses these protocol vulnerabilities in lighttpd. \n\nCVE-2009-3555\n\n  Marsh Ray, Steve Dispensa, and Martin Rex discovered that the TLS\n  and SSLv3 protocols do not properly associate renegotiation\n  handshakes with an existing connection, which allows man-in-the-middle\n  attackers to insert data into HTTPS sessions. This issue is solved\n  in lighttpd by disabling client initiated renegotiation by default. \n  \n  Those users that do actually need such renegotiations, can reenable\n  them via the new \u0027ssl.disable-client-renegotiation\u0027 parameter. \n\nCVE-2012-4929\n\n  Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL\n  protocol when using compression. This side channel attack, dubbed\n  \u0027CRIME\u0027, allows eavesdroppers to gather information to recover the\n  original plaintext in the protocol. This update disables compression. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 1.4.28-2+squeeze1.2. \n\nFor the testing distribution (wheezy), and the unstable distribution (sid)\nthese problems have been fixed in version 1.4.30-1. \n\nWe recommend that you upgrade your lighttpd packages. \n\nFor Debian 7 (wheezy) this update adds a missing part to make it\nactually possible to disable client-initiated renegotiation and\ndisables it by default (CVE-2009-3555). TLS compression is disabled\n(CVE-2012-4929), although this is normally already disabled by the OpenSSL\nsystem library. Finally it adds the ability to disable the SSLv3 protocol\n(CVE-2014-3566) entirely via the new \"DisableSSLv3\" configuration\ndirective, although it will not disabled by default in this update. \nAdditionally a non-security sensitive issue in redirect encoding is\naddressed. \n\nFor Debian 8 (jessie) these issues have been fixed prior to the release,\nwith the exception of client-initiated renegotiation (CVE-2009-3555)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "PACKETSTORM",
        "id": "100761"
      },
      {
        "db": "PACKETSTORM",
        "id": "83414"
      },
      {
        "db": "PACKETSTORM",
        "id": "96463"
      },
      {
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "db": "PACKETSTORM",
        "id": "131826"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-41001",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-3555",
        "trust": 2.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#120541",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "38781",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42377",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37501",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39632",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37604",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "41972",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "43308",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38241",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37859",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "40070",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "41818",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39292",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42816",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42379",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39317",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38020",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42467",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37320",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37640",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37656",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37383",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42724",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38003",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "44183",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42733",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38484",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "40545",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "40866",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39242",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38056",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39278",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39243",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42808",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37675",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39127",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39461",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39819",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37453",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "40747",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "41490",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39628",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "44954",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39500",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "48577",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "42811",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37291",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "41480",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37292",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37399",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39713",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "38687",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "37504",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "39136",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "41967",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023217",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023273",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023274",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023206",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023272",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023427",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023218",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023163",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023214",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023211",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023219",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023216",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1024789",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023148",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023213",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023271",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023243",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023209",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023215",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023208",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023411",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023204",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023224",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023210",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023207",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023426",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023428",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023205",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023275",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023270",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1023212",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-2745",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3353",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-3069",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0086",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3354",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3484",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1793",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3310",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0982",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0033",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3220",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-2010",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1639",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1107",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-3126",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0916",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3164",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0032",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0086",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3313",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0748",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1350",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3521",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0994",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-3086",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1191",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0173",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3587",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0933",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3205",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1054",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0848",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1673",
        "trust": 1.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3165",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/05/3",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/07/3",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/23/10",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/05/5",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/20/1",
        "trust": 1.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/11/06/3",
        "trust": 1.1
      },
      {
        "db": "OSVDB",
        "id": "65202",
        "trust": 1.1
      },
      {
        "db": "OSVDB",
        "id": "62210",
        "trust": 1.1
      },
      {
        "db": "OSVDB",
        "id": "60521",
        "trust": 1.1
      },
      {
        "db": "OSVDB",
        "id": "60972",
        "trust": 1.1
      },
      {
        "db": "HITACHI",
        "id": "HS10-030",
        "trust": 1.1
      },
      {
        "db": "USCERT",
        "id": "TA10-222A",
        "trust": 1.1
      },
      {
        "db": "USCERT",
        "id": "TA10-287A",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "36935",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "120365",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "83414",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "131826",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "10071",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "10579",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82657",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82770",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "130868",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83271",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "90262",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "88173",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "91309",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "106155",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83415",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "111273",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "92095",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "88167",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "124088",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "120714",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82652",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "94087",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "97489",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "95279",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "137201",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "102374",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "106156",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "89136",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "92497",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "88621",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "94088",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "89667",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "88698",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "84112",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "90286",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "127267",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "84183",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "86075",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114810",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "88224",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "123380",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "84181",
        "trust": 0.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-069",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-67231",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001",
        "trust": 0.1
      },
      {
        "db": "SECUNIA",
        "id": "44293",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "100761",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "96463",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "PACKETSTORM",
        "id": "100761"
      },
      {
        "db": "PACKETSTORM",
        "id": "83414"
      },
      {
        "db": "PACKETSTORM",
        "id": "96463"
      },
      {
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "db": "PACKETSTORM",
        "id": "131826"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "id": "VAR-200911-0398",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T19:45:18.768000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-295",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://extendedsubset.com/?p=8"
      },
      {
        "trust": 1.9,
        "url": "http://www.links.org/?p=780"
      },
      {
        "trust": 1.9,
        "url": "http://www.links.org/?p=786"
      },
      {
        "trust": 1.9,
        "url": "http://www.links.org/?p=789"
      },
      {
        "trust": 1.9,
        "url": "http://blogs.iss.net/archive/sslmitmiscsrf.html"
      },
      {
        "trust": 1.9,
        "url": "http://www.ietf.org/mail-archive/web/tls/current/msg03948.html"
      },
      {
        "trust": 1.9,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "trust": 1.9,
        "url": "https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt"
      },
      {
        "trust": 1.9,
        "url": "http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html"
      },
      {
        "trust": 1.2,
        "url": "http://extendedsubset.com/renegotiating_tls.pdf"
      },
      {
        "trust": 1.1,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1"
      },
      {
        "trust": 1.1,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1"
      },
      {
        "trust": 1.1,
        "url": "http://securitytracker.com/id?1023148"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023163"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023204"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023205"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023206"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023207"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023208"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023209"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023210"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023211"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023212"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023213"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023214"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023215"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023216"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023217"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023218"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023219"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023224"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023243"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023270"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023271"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023272"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023273"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023274"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023275"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023411"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023426"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023427"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1023428"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id?1024789"
      },
      {
        "trust": 1.1,
        "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a0080b01d1d.shtml"
      },
      {
        "trust": 1.1,
        "url": "http://seclists.org/fulldisclosure/2009/nov/139"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/507952/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/508075/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/508130/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html"
      },
      {
        "trust": 1.1,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1"
      },
      {
        "trust": 1.1,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1"
      },
      {
        "trust": 1.1,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/36935"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37291"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37292"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37320"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37383"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37399"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37453"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37501"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37504"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37604"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37640"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37656"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37675"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/37859"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38003"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38020"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38056"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38241"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38484"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38687"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/38781"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39127"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39136"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39242"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39243"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39278"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39292"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39317"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39461"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39500"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39628"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39632"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39713"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/39819"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/40070"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/40545"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/40747"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/40866"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/41480"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/41490"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/41818"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/41967"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/41972"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42377"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42379"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42467"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42724"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42733"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42808"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42811"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/42816"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/43308"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/44183"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/44954"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/48577"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/60521"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/60972"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/62210"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/65202"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3164"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3165"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3205"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3220"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3310"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3313"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3353"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3354"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3484"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3521"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/3587"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0086"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0173"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0748"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0848"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0916"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0933"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0982"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/0994"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1054"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1107"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1191"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1350"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1639"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1673"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/1793"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/2010"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/2745"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/3069"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/3086"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2010/3126"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2011/0032"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2011/0033"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2011/0086"
      },
      {
        "trust": 1.1,
        "url": "http://lists.apple.com/archives/security-announce/2010/jan/msg00000.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.apple.com/archives/security-announce/2010//may/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.apple.com/archives/security-announce/2010//may/msg00002.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2009/dsa-1934"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2011/dsa-2141"
      },
      {
        "trust": 1.1,
        "url": "http://www.debian.org/security/2015/dsa-3253"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg01029.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg01020.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00645.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00944.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00428.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00442.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00449.html"
      },
      {
        "trust": 1.1,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-december/msg00634.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049702.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049528.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049455.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-april/039561.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-april/039957.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-may/040652.html"
      },
      {
        "trust": 1.1,
        "url": "http://security.gentoo.org/glsa/glsa-200912-01.xml"
      },
      {
        "trust": 1.1,
        "url": "http://security.gentoo.org/glsa/glsa-201203-22.xml"
      },
      {
        "trust": 1.1,
        "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
      },
      {
        "trust": 1.1,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02436041"
      },
      {
        "trust": 1.1,
        "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02273751"
      },
      {
        "trust": 1.1,
        "url": "http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02512995"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/522176"
      },
      {
        "trust": 1.1,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01945686"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1ic67848"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1ic68054"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1ic68055"
      },
      {
        "trust": 1.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:076"
      },
      {
        "trust": 1.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:084"
      },
      {
        "trust": 1.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:089"
      },
      {
        "trust": 1.1,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm12247"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0119.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0130.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0155.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0165.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0167.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0337.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0338.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0339.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0768.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0770.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0786.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0807.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0865.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0986.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2010-0987.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2011-0880.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta10-222a.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta10-287a.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-1010-1"
      },
      {
        "trust": 1.1,
        "url": "http://ubuntu.com/usn/usn-923-1"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-927-1"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-927-4"
      },
      {
        "trust": 1.1,
        "url": "http://www.ubuntu.com/usn/usn-927-5"
      },
      {
        "trust": 1.1,
        "url": "http://www.kb.cert.org/vuls/id/120541"
      },
      {
        "trust": 1.1,
        "url": "http://openbsd.org/errata45.html#010_openssl"
      },
      {
        "trust": 1.1,
        "url": "http://openbsd.org/errata46.html#004_openssl"
      },
      {
        "trust": 1.1,
        "url": "http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/05/3"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/05/5"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/06/3"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/07/3"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/20/1"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2009/11/23/10"
      },
      {
        "trust": 1.1,
        "url": "http://www.ietf.org/mail-archive/web/tls/current/msg03928.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3cdev.tomcat.apache.org%3e"
      },
      {
        "trust": 1.1,
        "url": "https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3cdev.tomcat.apache.org%3e"
      },
      {
        "trust": 1.1,
        "url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3cdev.tomcat.apache.org%3e"
      },
      {
        "trust": 1.1,
        "url": "https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3cdev.tomcat.apache.org%3e"
      },
      {
        "trust": 1.1,
        "url": "http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html"
      },
      {
        "trust": 1.1,
        "url": "http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during"
      },
      {
        "trust": 1.1,
        "url": "http://clicky.me/tlsvuln"
      },
      {
        "trust": 1.1,
        "url": "http://kbase.redhat.com/faq/docs/doc-20491"
      },
      {
        "trust": 1.1,
        "url": "http://support.apple.com/kb/ht4004"
      },
      {
        "trust": 1.1,
        "url": "http://support.apple.com/kb/ht4170"
      },
      {
        "trust": 1.1,
        "url": "http://support.apple.com/kb/ht4171"
      },
      {
        "trust": 1.1,
        "url": "http://support.avaya.com/css/p8/documents/100070150"
      },
      {
        "trust": 1.1,
        "url": "http://support.avaya.com/css/p8/documents/100081611"
      },
      {
        "trust": 1.1,
        "url": "http://support.avaya.com/css/p8/documents/100114315"
      },
      {
        "trust": 1.1,
        "url": "http://support.avaya.com/css/p8/documents/100114327"
      },
      {
        "trust": 1.1,
        "url": "http://support.citrix.com/article/ctx123359"
      },
      {
        "trust": 1.1,
        "url": "http://support.zeus.com/zws/media/docs/4.3/release_notes"
      },
      {
        "trust": 1.1,
        "url": "http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released"
      },
      {
        "trust": 1.1,
        "url": "http://sysoev.ru/nginx/patch.cve-2009-3555.txt"
      },
      {
        "trust": 1.1,
        "url": "http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html"
      },
      {
        "trust": 1.1,
        "url": "http://wiki.rpath.com/advisories:rpsa-2009-0155"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21426108"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21432298"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24006386"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24025312"
      },
      {
        "trust": 1.1,
        "url": "http://www.arubanetworks.com/support/alerts/aid-020810.txt"
      },
      {
        "trust": 1.1,
        "url": "http://www.betanews.com/article/1257452450"
      },
      {
        "trust": 1.1,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs10-030/index.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.ingate.com/relnote.php?ver=481"
      },
      {
        "trust": 1.1,
        "url": "http://www.mozilla.org/security/announce/2010/mfsa2010-22.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.openoffice.org/security/cves/cve-2009-3555.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.openssl.org/news/secadv_20091111.txt"
      },
      {
        "trust": 1.1,
        "url": "http://www.opera.com/docs/changelogs/unix/1060/"
      },
      {
        "trust": 1.1,
        "url": "http://www.opera.com/support/search/view/944/"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.proftpd.org/docs/release_notes-1.3.2c"
      },
      {
        "trust": 1.1,
        "url": "http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.tombom.co.uk/blog/?p=85"
      },
      {
        "trust": 1.1,
        "url": "http://www.vmware.com/security/advisories/vmsa-2010-0019.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.vmware.com/security/advisories/vmsa-2011-0003.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
      },
      {
        "trust": 1.1,
        "url": "http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html"
      },
      {
        "trust": 1.1,
        "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=526689"
      },
      {
        "trust": 1.1,
        "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=545755"
      },
      {
        "trust": 1.1,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888"
      },
      {
        "trust": 1.1,
        "url": "https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10088"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11578"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11617"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7315"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7478"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7973"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8366"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8535"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54158"
      },
      {
        "trust": 1.0,
        "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa50"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=126150535619567\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=127419602507642\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=pm00675\u0026apar=only"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=142660345230545\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.597446"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=132077688910227\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=apache-httpd-announce\u0026m=125755783724966\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=127557596201693\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=cryptography\u0026m=125752275331877\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00014.html"
      },
      {
        "trust": 0.8,
        "url": "http://cvs.openssl.org/chngview?cn=18790"
      },
      {
        "trust": 0.8,
        "url": "http://www.links.org/files/no-renegotiation-2.patch"
      },
      {
        "trust": 0.8,
        "url": "http://blog.zoller.lu/2009/11/new-sslv3-tls-vulnerability-mitm.html"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555"
      },
      {
        "trust": 0.3,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3555"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4929"
      },
      {
        "trust": 0.2,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=132077688910227\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=142660345230545\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=127419602507642\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=134254866602253\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=130497311408250\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=133469267822771\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=126150535619567\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=127128920008563\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=127557596201693\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026amp;q=pm00675\u0026amp;apar=only"
      },
      {
        "trust": 0.1,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2009\u0026amp;m=slackware-security.597446"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=apache-httpd-announce\u0026amp;m=125755783724966\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=cryptography\u0026amp;m=125752275331877\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "https://kb.bluecoat.com/index?page=content\u0026amp;id=sa50"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44293"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/44293/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/research/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html#appendixas"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/44293/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/jobs/open_positions/reverse_engineer"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://security.freebsd.org/\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://security.freebsd.org/advisories/freebsd-sa-09:15.ssl.asc"
      },
      {
        "trust": 0.1,
        "url": "http://security.freebsd.org/patches/sa-09:15/ssl.patch.asc"
      },
      {
        "trust": 0.1,
        "url": "http://security.freebsd.org/patches/sa-09:15/ssl.patch"
      },
      {
        "trust": 0.1,
        "url": "http://www.freebsd.org/handbook/makeworld.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://download3.vmware.com/software/vi/esx350-201012409-sg.zip"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/security/advisories"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2409"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2409"
      },
      {
        "trust": 0.1,
        "url": "http://download3.vmware.com/software/vi/esx350-201012408-sg.zip"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/security"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1055"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3069"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0590"
      },
      {
        "trust": 0.1,
        "url": "http://download3.vmware.com/software/vi/esx350-201012401-sg.zip"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/security_response.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/eos.html"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1030000"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0590"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1029993"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3069"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0405"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1029999"
      },
      {
        "trust": 0.1,
        "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0405"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/eos_vi.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/lifecycle/vi/faq.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "PACKETSTORM",
        "id": "100761"
      },
      {
        "db": "PACKETSTORM",
        "id": "83414"
      },
      {
        "db": "PACKETSTORM",
        "id": "96463"
      },
      {
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "db": "PACKETSTORM",
        "id": "131826"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "db": "PACKETSTORM",
        "id": "100761"
      },
      {
        "db": "PACKETSTORM",
        "id": "83414"
      },
      {
        "db": "PACKETSTORM",
        "id": "96463"
      },
      {
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "db": "PACKETSTORM",
        "id": "131826"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-11-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "date": "2009-11-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "date": "2011-04-24T07:03:07",
        "db": "PACKETSTORM",
        "id": "100761"
      },
      {
        "date": "2009-12-03T21:01:42",
        "db": "PACKETSTORM",
        "id": "83414"
      },
      {
        "date": "2010-12-08T18:34:39",
        "db": "PACKETSTORM",
        "id": "96463"
      },
      {
        "date": "2013-02-18T15:23:02",
        "db": "PACKETSTORM",
        "id": "120365"
      },
      {
        "date": "2015-05-08T13:32:34",
        "db": "PACKETSTORM",
        "id": "131826"
      },
      {
        "date": "2009-11-09T17:30:00.407000",
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-07-22T00:00:00",
        "db": "CERT/CC",
        "id": "VU#120541"
      },
      {
        "date": "2023-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41001"
      },
      {
        "date": "2024-11-21T01:07:38.960000",
        "db": "NVD",
        "id": "CVE-2009-3555"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SSL and TLS protocols renegotiation vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#120541"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.