U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-0949

Change History

Modified Analysis by NIST 12/28/2023 10:21:37 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-476
Removed CWE
NIST CWE-399

								
						
Changed CPE Configuration
OR
     *cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
     *cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* versions up to (including) 1.3.9
OR
     *cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* versions up to (excluding) 1.3.10
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (excluding) 10.4.11
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions from (including) 10.5.0 up to (excluding) 10.5.8
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (excluding) 10.4.11
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions from (including) 10.5.0 up to (excluding) 10.5.8
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
Changed Reference Type
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html No Types Assigned
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html Mailing List
Changed Reference Type
http://secunia.com/advisories/35322 Vendor Advisory
http://secunia.com/advisories/35322 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35328 Vendor Advisory
http://secunia.com/advisories/35328 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35340 Vendor Advisory
http://secunia.com/advisories/35340 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35342 Vendor Advisory
http://secunia.com/advisories/35342 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35685 No Types Assigned
http://secunia.com/advisories/35685 Broken Link
Changed Reference Type
http://secunia.com/advisories/36701 No Types Assigned
http://secunia.com/advisories/36701 Broken Link
Changed Reference Type
http://securitytracker.com/id?1022321 No Types Assigned
http://securitytracker.com/id?1022321 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://support.apple.com/kb/HT3865 No Types Assigned
http://support.apple.com/kb/HT3865 Third Party Advisory
Changed Reference Type
http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability Exploit
http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability Exploit, Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2009/dsa-1811 Patch
http://www.debian.org/security/2009/dsa-1811 Third Party Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2009-1082.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2009-1082.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2009-1083.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2009-1083.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/504032/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/504032/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/35169 Exploit
http://www.securityfocus.com/bid/35169 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-780-1 No Types Assigned
http://www.ubuntu.com/usn/USN-780-1 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=500972 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=500972 Issue Tracking
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/50926 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/50926 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631 Broken Link