U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-1073

Change History

Modified Analysis by NIST 2/15/2024 4:31:04 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:debian:nss-ldap:0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:*
     *cpe:2.3:a:debian:nss-ldap:*:*:*:*:*:*:*:* versions up to (including) 0.6.7
OR
     *cpe:2.3:a:debian:nss-ldap:*:*:*:*:*:*:*:* versions up to (excluding) 0.6.8
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
NIST CWE-732
Removed CWE
NIST CWE-264

								
						
Changed Reference Type
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813 Exploit
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813 Broken Link, Exploit
Changed Reference Type
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806 No Types Assigned
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806 Broken Link
Changed Reference Type
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476 Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476 Mailing List, Patch
Changed Reference Type
http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322 No Types Assigned
http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322 Broken Link
Changed Reference Type
http://launchpad.net/bugs/cve/2009-1073 No Types Assigned
http://launchpad.net/bugs/cve/2009-1073 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/34523 No Types Assigned
http://secunia.com/advisories/34523 Broken Link
Changed Reference Type
http://www.debian.org/security/2009/dsa-1758 Patch
http://www.debian.org/security/2009/dsa-1758 Patch, Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/03/23/3 No Types Assigned
http://www.openwall.com/lists/oss-security/2009/03/23/3 Mailing List
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/03/24/2 No Types Assigned
http://www.openwall.com/lists/oss-security/2009/03/24/2 Mailing List
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/03/25/3 No Types Assigned
http://www.openwall.com/lists/oss-security/2009/03/25/3 Mailing List
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/03/25/4 No Types Assigned
http://www.openwall.com/lists/oss-security/2009/03/25/4 Mailing List
Changed Reference Type
http://www.securityfocus.com/bid/34211 No Types Assigned
http://www.securityfocus.com/bid/34211 Broken Link, Third Party Advisory, VDB Entry