U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-2416

Change History

Modified Analysis by NIST 2/02/2024 11:04:10 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 4.0.4
     *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 2.0 up to (excluding) 4.0
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to (excluding) 10.4.11
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from (including) 10.5.0 up to (excluding) 10.5.8
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from (including) 10.6.0 up to (excluding) 10.6.2
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions up to (excluding) 10.4.11
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions from (including) 10.5.0 up to (excluding) 10.5.8
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions from (including) 10.6.0 up to (excluding) 10.6.2
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.172.43
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:sun:openoffice.org:*:*:*:*:*:*:*:* versions from (including) 2.0.0 up to (excluding) 2.4.3
     *cpe:2.3:a:sun:openoffice.org:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (excluding) 3.1.1
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
     *cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
     *cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:* versions from (including) 10.3 up to (including) 11.1
     *cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Added CVSS V2 Metadata

								
							
							
						
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-416
Removed CWE
NIST CWE-399

								
						
Changed Reference Type
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html No Types Assigned
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html Release Notes
Changed Reference Type
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html No Types Assigned
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html Mailing List
Changed Reference Type
http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html No Types Assigned
http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html Mailing List
Changed Reference Type
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html No Types Assigned
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html Mailing List
Changed Reference Type
http://secunia.com/advisories/35036 No Types Assigned
http://secunia.com/advisories/35036 Broken Link
Changed Reference Type
http://secunia.com/advisories/36207 No Types Assigned
http://secunia.com/advisories/36207 Broken Link
Changed Reference Type
http://secunia.com/advisories/36338 No Types Assigned
http://secunia.com/advisories/36338 Broken Link
Changed Reference Type
http://secunia.com/advisories/36417 No Types Assigned
http://secunia.com/advisories/36417 Broken Link
Changed Reference Type
http://secunia.com/advisories/36631 No Types Assigned
http://secunia.com/advisories/36631 Broken Link
Changed Reference Type
http://secunia.com/advisories/37346 No Types Assigned
http://secunia.com/advisories/37346 Broken Link
Changed Reference Type
http://secunia.com/advisories/37471 No Types Assigned
http://secunia.com/advisories/37471 Broken Link
Changed Reference Type
http://support.apple.com/kb/HT3937 No Types Assigned
http://support.apple.com/kb/HT3937 Third Party Advisory
Changed Reference Type
http://support.apple.com/kb/HT3949 No Types Assigned
http://support.apple.com/kb/HT3949 Third Party Advisory
Changed Reference Type
http://support.apple.com/kb/HT4225 No Types Assigned
http://support.apple.com/kb/HT4225 Third Party Advisory
Changed Reference Type
http://www.cert.fi/en/reports/2009/vulnerability2009085.html No Types Assigned
http://www.cert.fi/en/reports/2009/vulnerability2009085.html Broken Link
Changed Reference Type
http://www.codenomicon.com/labs/xml/ No Types Assigned
http://www.codenomicon.com/labs/xml/ Broken Link
Changed Reference Type
http://www.debian.org/security/2009/dsa-1859 Patch
http://www.debian.org/security/2009/dsa-1859 Mailing List, Patch
Changed Reference Type
http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html No Types Assigned
http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html Patch
Changed Reference Type
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html No Types Assigned
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html Broken Link
Changed Reference Type
http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html No Types Assigned
http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/507985/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/36010 No Types Assigned
http://www.securityfocus.com/bid/36010 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-815-1 No Types Assigned
http://www.ubuntu.com/usn/USN-815-1 Third Party Advisory
Changed Reference Type
http://www.vmware.com/security/advisories/VMSA-2009-0016.html No Types Assigned
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2009/2420 No Types Assigned
http://www.vupen.com/english/advisories/2009/2420 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2009/3184 No Types Assigned
http://www.vupen.com/english/advisories/2009/3184 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2009/3217 No Types Assigned
http://www.vupen.com/english/advisories/2009/3217 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2009/3316 No Types Assigned
http://www.vupen.com/english/advisories/2009/3316 Broken Link
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=515205 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=515205 Issue Tracking, Patch
Changed Reference Type
https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59 No Types Assigned
https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59 Patch
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783 Broken Link
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 Broken Link
Changed Reference Type
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html No Types Assigned
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html Mailing List
Changed Reference Type
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html No Types Assigned
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html Mailing List
Changed Reference Type
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html No Types Assigned
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html Mailing List