Zero-day vulnerability

A zero-day (also known as a 0-day) is a vulnerability in software or hardware that is typically unknown to the vendor and for which no patch or other fix is available. The vendor has zero days to prepare a patch as the vulnerability has already been described or exploited.

Despite developers' goal of delivering a product that works entirely as intended, virtually all software and hardware contains bugs. Many of these impair the security of the system and are thus vulnerabilities. Although the basis of only a minority of cyberattacks, zero-days are considered more dangerous than known vulnerabilities because there are fewer countermeasures possible.

States are the primary users of zero-day vulnerabilities, not only because of the high cost of finding or buying them, but also the significant cost of writing the attack software. Many vulnerabilities are discovered by hackers or security researchers, who may disclose them to the vendor (often in exchange for a bug bounty) or sell them to states or criminal groups. The use of zero-days increased after many popular software companies began to encrypt messages and data, meaning that the unencrypted data could only be obtained by hacking into the software before it was encrypted.

Definition

Despite developers' goal of delivering a product that works entirely as intended, virtually all software and hardware contain bugs.[1] If a bug creates a security risk, it is called a vulnerability. Vulnerabilities vary in their ability to be exploited by malicious actors. Some are not usable at all, while others can be used to disrupt the device with a denial of service attack. The most valuable allow the attacker to inject and run their own code, without the user being aware of it.[2] Although the term "zero-day" initially referred to the time since the vendor had become aware of the vulnerability, zero-day vulnerabilities can also be defined as the subset of vulnerabilities for which no patch or other fix is available.[3][4][5] A zero-day exploit is any exploit that takes advantage of such a vulnerability.[2]

Exploits

An exploit is the delivery mechanism that takes advantage of the vulnerability to penetrate the target's systems, for such purposes as disrupting operations, installing malware, or exfiltrating data.[6] Researchers Lillian Ablon and Andy Bogart write that "little is known about the true extent, use, benefit, and harm of zero-day exploits".[7] Exploits based on zero-day vulnerabilities are considered more dangerous than those that take advantage of a known vulnerability.[8][9] However, it is likely that most cyberattacks use known vulnerabilities, not zero-days.[7]

States are the primary users of zero-day exploits, not only because of the high cost of finding or buying vulnerabilities, but also the significant cost of writing the attack software. Nevertheless, anyone can use a vulnerability,[4] and according to research by the RAND Corporation, "any serious attacker can always get an affordable zero-day for almost any target".[10] Many targeted attacks[11] and most advanced persistent threats rely on zero-day vulnerabilities.[12]

The average time to develop an exploit from a zero-day vulnerability was estimated at 22 days.[13] The difficulty of developing exploits has been increasing over time due to increased anti-exploitation features in popular software.[14]

Window of vulnerability

Vulnerability timeline

Zero-day vulnerabilities are often classified as alive—meaning that there is no public knowledge of the vulnerability—and dead—the vulnerability has been disclosed, but not patched. If the software's maintainers are actively searching for vulnerabilities, it is a living vulnerability; such vulnerabilities in unmaintained software are called immortal. Zombie vulnerabilities can be exploited in older versions of the software but have been patched in newer versions.[15]

Even publicly known and zombie vulnerabilities are often exploitable for an extended period.[16][17] Security patches can take months to develop,[18] or may never be developed.[17] A patch can have negative effects on the functionality of software[17] and users may need to test the patch to confirm functionality and compatibility.[19] Larger organizations may fail to identify and patch all dependencies, while smaller enterprises and personal users may not install patches.[17]

Research suggests that risk of cyberattack increases if the vulnerability is made publicly known or a patch is released.[20] Cybercriminals can reverse engineer the patch to find the underlying vulnerability and develop exploits,[21] often faster than users install the patch.[20]

According to research by RAND Corporation published in 2017, zero-day exploits remain usable for 6.9 years on average,[22] although those purchased from a third party only remain usable for 1.4 years on average.[13] The researchers were unable to determine if any particular platform or software (such as open-source software) had any relationship to the life expectancy of a zero-day vulnerability.[23] Although the RAND researchers found that 5.7 percent of a stockpile of secret zero-day vulnerabilities will have been discovered by someone else within a year,[24] another study found a higher overlap rate, as high as 10.8 percent to 21.9 percent per year.[25]

Countermeasures

Because, by definition, there is no patch that can block a zero-day exploit, all systems employing the software or hardware with the vulnerability are at risk. This includes secure systems such as banks and governments that have all patches up to date.[26] Security systems are designed around known vulnerabilities, and repeated exploitations of a zero-day exploit could continue undetected for an extended period of time.[17] Although there have been many proposals for a system that is effective at detecting zero-day exploits, this remains an active area of research in 2023.[27]

Many organizations have adopted defense-in-depth tactics so that attacks are likely to require breaching multiple levels of security, which makes it more difficult to achieve.[28] Conventional cybersecurity measures such as training and access control such as multifactor authentication, least-privilege access, and air-gapping makes it harder to compromise systems with a zero-day exploit.[29] Since writing perfectly secure software is impossible, some researchers argue that driving up the cost of exploits is a good strategy to reduce the burden of cyberattacks.[30]

Market

Comparing the average prices of different kinds of exploits, 2015–2022

Zero-day exploits can fetch millions of dollars.[4] There are three main types of buyers:[31]

  • White: the vendor, or to third parties such as the Zero Day Initiative that disclose to the vendor. Often such disclosure is in exchange for a bug bounty.[32][33][34] Not all companies respond positively to disclosures, as they can cause legal liability and operational overhead. It is not uncommon to receive cease-and-desist letters from software vendors after disclosing a vulnerability for free.[35]
  • Gray: the largest[4] and most lucrative. Government or intelligence agencies buy zero-days and may use it in an attack, stockpile the vulnerability, or notify the vendor.[31] The United States federal government is one of the largest buyers.[4] As of 2013, the Five Eyes (United States, United Kingdom, Canada, Australia, and New Zealand) captured the plurality of the market and other significant purchasers included Russia, India, Brazil, Malaysia, Singapore, North Korea, and Iran. Middle Eastern countries were poised to become the biggest spenders.[36]
  • Black: organized crime, which typically prefers exploit software rather than just knowledge of a vulnerability.[37] These users are more likely to employ "half-days" where a patch is already available.[38]

In 2015, the markets for government and crime were estimated at at least ten times larger than the white market.[31] Sellers are often hacker groups that seek out vulnerabilities in widely used software for financial reward.[39] Some will only sell to certain buyers, while others will sell to anyone.[38] White market sellers are more likely to be motivated by non pecuniary rewards such as recognition and intellectual challenge.[40] Selling zero day exploits is legal.[34][41] Despite calls for more regulation, law professor Mailyn Fidler says there is little chance of an international agreement because key players such as Russia and Israel are not interested.[41]

The sellers and buyers that trade in zero-days tend to be secretive, relying on non-disclosure agreements and classified information laws to keep the exploits secret. If the vulnerability becomes known, it can be patched and its value consequently crashes.[42] Because the market lacks transparency, it can be hard for parties to find a fair price. Sellers might not be paid if the vulnerability was disclosed before it was verified, or if the buyer declined to purchase it but used it anyway. With the proliferation of middlemen, sellers could never know to what use the exploits could be put.[43] Buyers could not guarantee that the exploit was not sold to another party.[44] Both buyers and sellers advertise on the dark web.[45]

Research published in 2022 based on maximum prices paid as quoted by a single exploit broker found a 44 percent annualized inflation rate in exploit pricing. Remote zero-click exploits could fetch the highest price, while those that require local access to the device are much cheaper.[46] Vulnerabilities in widely used software are also more expensive.[47] They estimated that around 400 to 1,500 people sold exploits to that broker and they made around $5,500 to $20,800 annually.[48]

Disclosure and stockpiling

As of 2017, there is an ongoing debate as to whether the United States should disclose the vulnerabilities it is aware of, so that they can be patched, or keep them secret for its own use.[49] Reasons that states keep an vulnerability secret include wanting to use it offensively, or defensively in penetration testing.[10] Disclosing the vulnerability reduces the risk that consumers and all users of the software will be victimized by malware or data breaches.[1]

The phases of zero-day vulnerability disclosure, along with a typical timeline, are as follows:

  1. Discovery: A researcher identifies the vulnerability, marking "Day 0."
  2. Reporting: The researcher notifies the vendor or a third party, starting remediation efforts.
  3. Patch Development: The vendor develops a fix, which can take weeks to months depending on the complexity.
  4. Public Disclosure: Once a patch is released, details are shared publicly. If no patch is issued within an agreed period (commonly 90 days), some researchers disclose it to push for action.

History

Zero-day exploits increased in significance after services such as Apple, Google, Facebook, and Microsoft encrypted servers and messages, meaning that the most feasible way to access a user's data was to intercept it at the source before it was encrypted.[26] One of the best-known use of zero-day exploits was the Stuxnet worm, which used four zero-day vulnerabilities to damage Iran's nuclear program in 2010.[7] The worm showed what could be achieved by zero-day exploits, unleashing an expansion in the market.[36]

The United States National Security Agency (NSA) increased its search for zero-day vulnerabilities after large tech companies refused to install backdoors into the software, tasking the Tailored Access Operations (TAO) with discovering and purchasing zero-day exploits.[50] In 2007, former NSA employee Charlie Miller publicly revealed for the first time that the United States government was buying zero-day exploits.[51] Some information about the NSA involvement with zero-days was revealed in the documents leaked by NSA contractor Edward Snowden in 2013, but details were lacking.[50] Reporter Nicole Perlroth concluded that "either Snowden’s access as a contractor didn’t take him far enough into the government’s systems for the intel required, or some of the government’s sources and methods for acquiring zero-days were so confidential, or controversial, that the agency never dared put them in writing".[52]

One of the most infamous vulnerabilities discovered after 2013, Heartbleed (CVE-2014-0160), was not a zero-day when publicly disclosed but underscored the critical impact that software bugs can have on global cybersecurity. This flaw in the OpenSSL cryptographic library could have been exploited as a zero-day prior to its discovery, allowing attackers to steal sensitive information such as private keys and passwords.[53]

In 2016 the hacking group known as Shadow Brokers released a trove of sophisticated zero-day exploits reportedly stolen from the United States National Security Agency (NSA). These included tools such as EternalBlue, which leveraged a vulnerability in Microsoft Windows' Server Message Block (SMB) protocol. EternalBlue was later weaponized in high-profile attacks like WannaCry and NotPetya, causing widespread global damage and highlighting the risks of stockpiling vulnerabilities.[54]

The year 2020 saw one of the most sophisticated cyber espionage campaigns to date, in which attackers exploited multiple vulnerabilities, including zero-day vulnerabilities, to compromise SolarWinds' Orion software. This allowed access to numerous government and corporate networks.[55]

In 2021 Chinese state-sponsored group, Hafnium, exploited zero-day vulnerabilities in Microsoft Exchange Server to conduct cyber espionage. Known as ProxyLogon, these flaws allowed attackers to bypass authentication and execute arbitrary code, compromising thousands of systems globally.[56]

In 2022 the spyware Pegasus, developed by Israel's NSO Group, was found to exploit zero-click vulnerabilities in messaging apps like iMessage and WhatsApp. These exploits allowed attackers to access targets' devices without requiring user interaction, heightening concerns over surveillance and privacy.[57]

References

  1. ^ a b Ablon & Bogart 2017, p. 1.
  2. ^ a b Ablon & Bogart 2017, p. 2.
  3. ^ Ablon & Bogart 2017, pp. iii, 2.
  4. ^ a b c d e Sood & Enbody 2014, p. 1.
  5. ^ Perlroth 2021, p. 7.
  6. ^ Strout 2023, p. 23.
  7. ^ a b c Ablon & Bogart 2017, p. 3.
  8. ^ Sood & Enbody 2014, p. 24.
  9. ^ Bravo & Kitchen 2022, p. 11.
  10. ^ a b Ablon & Bogart 2017, p. xiv.
  11. ^ Sood & Enbody 2014, pp. 2–3, 24.
  12. ^ Sood & Enbody 2014, p. 4.
  13. ^ a b Ablon & Bogart 2017, p. xiii.
  14. ^ Perlroth 2021, p. 142.
  15. ^ Ablon & Bogart 2017, p. xi.
  16. ^ Ablon & Bogart 2017, p. 8.
  17. ^ a b c d e Sood & Enbody 2014, p. 42.
  18. ^ Strout 2023, p. 26.
  19. ^ Libicki, Ablon & Webb 2015, p. 50.
  20. ^ a b Libicki, Ablon & Webb 2015, pp. 49–50.
  21. ^ Strout 2023, p. 28.
  22. ^ Ablon & Bogart 2017, p. x.
  23. ^ Ablon & Bogart 2017, pp. xi–xii.
  24. ^ Ablon & Bogart 2017, p. x: "For a given stockpile of zero-day vulnerabilities, after a year, approximately 5.7 percent have been discovered by an outside entity."
  25. ^ Leal, Marcelo M.; Musgrave, Paul (2023). "Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity". Contemporary Security Policy. 44 (3): 437–461. doi:10.1080/13523260.2023.2216112. ISSN 1352-3260.
  26. ^ a b Perlroth 2021, p. 8.
  27. ^ Ahmad et al. 2023, p. 10733.
  28. ^ Strout 2023, p. 24.
  29. ^ Libicki, Ablon & Webb 2015, p. 104.
  30. ^ Dellago, Simpson & Woods 2022, p. 41.
  31. ^ a b c Libicki, Ablon & Webb 2015, p. 44.
  32. ^ Dellago, Simpson & Woods 2022, p. 33.
  33. ^ O'Harrow 2013, p. 18.
  34. ^ a b Libicki, Ablon & Webb 2015, p. 45.
  35. ^ Strout 2023, p. 36.
  36. ^ a b Perlroth 2021, p. 145.
  37. ^ Libicki, Ablon & Webb 2015, pp. 44, 46.
  38. ^ a b Libicki, Ablon & Webb 2015, p. 46.
  39. ^ Sood & Enbody 2014, p. 116.
  40. ^ Libicki, Ablon & Webb 2015, pp. 46–47.
  41. ^ a b Gooding, Matthew (19 July 2022). "Zero day vulnerability trade is lucrative but risky". Tech Monitor. Retrieved 4 April 2024.
  42. ^ Perlroth 2021, p. 42.
  43. ^ Perlroth 2021, p. 57.
  44. ^ Perlroth 2021, p. 58.
  45. ^ Sood & Enbody 2014, p. 117.
  46. ^ Dellago, Simpson & Woods 2022, pp. 31, 41.
  47. ^ Libicki, Ablon & Webb 2015, p. 48.
  48. ^ Dellago, Simpson & Woods 2022, p. 42: "The number of independent active sellers (between 400[31] and 1500[35] individuals) ... 2015,[35] suggests an annual pay of $5.5k - 20.8k per researcher."
  49. ^ Ablon & Bogart 2017, p. iii.
  50. ^ a b Perlroth 2021, p. 9.
  51. ^ Perlroth 2021, pp. 60, 62.
  52. ^ Perlroth 2021, p. 10.
  53. ^ "Heartbleed: Serious OpenSSL zero day vulnerability revealed". ZDNet. Archived from the original on 2024-10-04. Retrieved 2024-11-29.
  54. ^ "The Shadow Brokers publishing the NSA vulnerabilities". Cyberlaw. Archived from the original on 2024-02-27. Retrieved 2024-11-29.
  55. ^ "SolarWinds hack explained: Everything you need to know". TechTarget. Archived from the original on 2024-10-05. Retrieved 2024-11-29.
  56. ^ "Businesses urged to act fast against ProxyLogon attack on Microsoft Exchange Server". S-RM. Archived from the original on 2024-11-29. Retrieved 2024-11-29.
  57. ^ "NSO Group's Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains". Citizenlab. Archived from the original on 2024-09-27. Retrieved 2024-11-29.

Sources

Read other articles:

Bobo adalah serial komik Prancis-Belgia yang dibuat oleh Paul Deliège dan Maurice Rosy. Serial ini menampilkan seorang tahanan eponymous dari penjara Inzepocket (di saku dengan aksen Prancis). Dalam bahasa Belanda, nama serial tersebut adalah Jaap. Sejarah Bobo pertama kali muncul dalam mini-récit (cerita mini) di majalah Spirou pada 11 Mei 1961.[1] Pada tahun-tahun awal, ditulis oleh Rosy, yang juga mengambil tanggung jawab artistik selama periode singkat di tahun 1970-an.[2 ...

 

 

Pour les articles homonymes, voir Occident (homonymie). Pour l’article ayant un titre homophone, voir Oxydant. Si ce bandeau n'est plus pertinent, retirez-le. Cliquez ici pour en savoir plus. Cet article ne cite pas suffisamment ses sources (juin 2022). Si vous disposez d'ouvrages ou d'articles de référence ou si vous connaissez des sites web de qualité traitant du thème abordé ici, merci de compléter l'article en donnant les références utiles à sa vérifiabilité et en les liant ...

 

 

Si ce bandeau n'est plus pertinent, retirez-le. Cliquez ici pour en savoir plus. Cet article peut avoir été modifié (voire créé) en échange d'une rémunération ou d’avantages non déclarés, ce qui constitue le cas échéant une violation des conditions d'utilisation de Wikipédia (décembre 2022). L'article doit être relu — et modifié si nécessaire — par des contributeurs indépendants pour apporter un regard critique aux contributions effectuées en violation des conditions ...

2022 Wisconsin Attorney General election ← 2018 November 8, 2022 2026 →   Nominee Josh Kaul Eric Toney Party Democratic Republican Popular vote 1,333,369 1,298,369 Percentage 50.6% 49.3% County results Congressional District results State Senate District results State Assembly District results Precinct resultsKaul:      40–50%      50–60%      60–70%      ...

 

 

Moussa Sissoko Moussa Sissoko pada tahun 2012Informasi pribadiNama lengkap Moussa SissokoTanggal lahir 16 Agustus 1989 (umur 34)Tempat lahir Le Blanc-Mesnil, PrancisTinggi 1,87 m (6 ft 2 in)Posisi bermain GelandangInformasi klubKlub saat ini FC NantesNomor 17Karier junior1995–1999 Espérance Aulnay1999–2001 Red Star FC2001–2003 Espérance Aulnay2003–2007 ToulouseKarier senior*Tahun Tim Tampil (Gol)2007–2013 Toulouse 192 (20)2013–2016 Newcastle United 118 (11)2...

 

 

komunitas Wikimedia beralih ke halaman ini, yang bukan mengenai Komunitas Wikipedia. Wikimedia beralih ke halaman ini, yang bukan mengenai MediaWiki atau Yayasan Wikimedia. Wikimedia movementFoto grup Wikimania 2023FokusBebas, konten terbuka, proyek-proyek Internet berbasis wikiWilayah layanan WorldwideJasaMenulis dan menyunting Wikipedia, Wiktionary, Wikimedia Commons, Wikidata, Wikiquote, Wikibooks, Wikisource, Wikispecies, Wikinews, Wikiversity, dan WikivoyagePerangkat lunak pengembang Med...

A query plan (or query execution plan) is a sequence of steps used to access data in a SQL relational database management system. This is a specific case of the relational model concept of access plans. Since SQL is declarative, there are typically many alternative ways to execute a given query, with widely varying performance. When a query is submitted to the database, the query optimizer evaluates some of the different, correct possible plans for executing the query and returns what it cons...

 

 

NASCAR team This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Sam Hunt Racing – news · newspapers · books · scholar · JSTOR (January 2020) (Learn how and when to remove this message) Sam Hunt RacingOwner(s)Sam HuntPrincipal(s)Allen Hart (Technical dir.)BaseMooresville, North CarolinaSeriesNASCAR Xfinity Series...

 

 

この記事は検証可能な参考文献や出典が全く示されていないか、不十分です。出典を追加して記事の信頼性向上にご協力ください。(このテンプレートの使い方)出典検索?: コルク – ニュース · 書籍 · スカラー · CiNii · J-STAGE · NDL · dlib.jp · ジャパンサーチ · TWL(2017年4月) コルクを打ち抜いて作った瓶の栓 コルク(木栓、�...

Mexican composer (1882–1948) For the Mexican boxer, see Manuel Ponce (boxer). This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (May 2009) (Learn how and when to remove this message) Manuel Ponce Manuel María Ponce Cuéllar (8 December 1882 – 24 April 1948), known in Mexico as Manuel M. Ponce, was a Mexican composer active in the 20th century. His work as a...

 

 

Questa voce sull'argomento cestisti portoricani è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Deán Borges Nazionalità  Stati Uniti Porto Rico Altezza 196 cm Peso 100 kg Pallacanestro Ruolo Ala piccola Termine carriera 2006 CarrieraGiovanili 1986-1991 Wagner SeahawksSquadre di club 1986-1987 Marat. de Coamo561989-1995 Marat. de Coamo2131996-1997 Avan. de Villalba631998&...

 

 

本條目存在以下問題,請協助改善本條目或在討論頁針對議題發表看法。 此條目需要編修,以確保文法、用詞、语气、格式、標點等使用恰当。 (2013年8月6日)請按照校對指引,幫助编辑這個條目。(幫助、討論) 此條目剧情、虛構用語或人物介紹过长过细,需清理无关故事主轴的细节、用語和角色介紹。 (2020年10月6日)劇情、用語和人物介紹都只是用於了解故事主軸,輔助�...

Variations of the economic philosophy This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Types of socialism – news · newspapers · books · scholar · JSTOR (February 2023) (Learn how and when to remove this message) Part of a series onSocialism HistoryOutline Development Age of the Enlightenment French Revolution...

 

 

The ActGenre Kasus nyata Drama Antologi Pembuat Nick Antosca Michelle Dean Pemeran Patricia Arquette Joey King AnnaSophia Robb Chloë Sevigny Calum Worthy Penata musikJeff RussoNegara asalAmerika SerikatBahasa asliInggrisJmlh. musim1Jmlh. episode8 (daftar episode)ProduksiProduser eksekutif Nick Antosca Michelle Dean Britton Rizzio Gregory Shephard ProduserJan Peter MeyboomDurasi48–60 menitRumah produksi Eat the Cat Writ Large Universal Content Productions Rilis asliJaringanHuluRilis2...

 

 

El Ayuntamiento de México fue la entidad legislativa y administrativa de la ciudad de México creado en 1521 durante el gobierno español hasta el año de 1929 en el México Independiente cuando fue suprimido su ayuntamiento. En el México independiente fue solo el órgano administrativo de la Municipalidad de México, que abarcó territorialmente a la Ciudad de México y a las villas de Guadalupe Hidalgo, Tacubaya y Azcapotzalco; esta municipalidad fue desaparecida en 1970, cuando su territ...

Israeli Druze officer of the IDF Ghassan AlianNative nameרסאן עליאןBorn (1972-03-21) 21 March 1972 (age 52)Shefa-'Amr, IsraelAllegiance IsraelService/branch Israel Defense ForcesYears of service1990–Rank Aluf (Major General)UnitCoordinator of Government Activities in the TerritoriesBattles/wars First Intifada South Lebanon conflict (1985–2000) 2006 Lebanon War Operation Cast Lead Operation Pillar of Defense Operation Protective Edge Israel–Hamas war Ghassan Alian...

 

 

一个小型的逐帧动画,显示了硬币的移动过程 Mary and Gretel (1916) 定格動畫 (英語:Stop motion animation),又名停格動畫、逐格動畫、逐帧动画,是一种动画技术,其原理即将每帧不同的图像连续播放,从而产生动画效果。最基本製作定格動畫的方法是利用相機作拍攝工具,為主要對象拍攝一連串的相片,每張相片之間為拍攝對象作小量移動,最後把整輯相片快速地連續播放便完�...

 

 

Questa voce sull'argomento società calcistiche inglesi è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Gillingham F.C.Calcio The Gills Segni distintiviUniformi di gara Casa Trasferta Colori sociali Blu, bianco SimboliStallone Dati societariCittàGillingham Nazione Inghilterra ConfederazioneUEFA Federazione FA CampionatoFootball League Two Fondazione1893 Presidente Paul Scally Allenatore Neil Harris StadioPriestfield Stadium(11.582 posti) Sito we...

Pour les articles homonymes, voir Graupner. Christoph Graupner Partition autographe de la cantate Wir haben nicht mit Fleisch und Blut zu kämpfen Données clés Nom de naissance Christoph Graupner Naissance 13 janvier 1683 Kirchberg, Électorat de Saxe Décès 10 mai 1760 (à 77 ans) Darmstadt, Landgraviat de Hesse-Darmstadt Activité principale Compositeur, claveciniste modifier Paraphe de Christoph Graupner. Christoph Graupner, né le 13 janvier 1683 à Kirchberg, mort le 10 mai 1760...

 

 

Cet article est une ébauche concernant une localité bulgare. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les recommandations des projets correspondants. Pour les articles homonymes, voir Montana (homonymie). Montana Монтана Héraldique Administration Pays Bulgarie Oblast Montana Maire Zlatko Jivkov (Indépendant) Code postal 3400 Démographie Population 39 595 hab. (en 2017) Géographie Coordonnées 43° 25′ 00″ nord,...