Vulnerabilites related to sun - cluster
var-201004-0739
Vulnerability from variot
Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software: Oracle Database Oracle Fusion Middleware Oracle Collaboration Suite Oracle E-Business Suite Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Oracle Industry Suite Oracle Solaris Products The following individual records exist to better document these issues: 39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities 39459 Oracle Solaris CVE-2010-0890 Local Vulnerability 39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability 39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability 39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability 39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability 39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability 39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability 39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability 39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability 39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability 39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability 39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability 39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability 39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability 39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability 39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability 39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability 39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability 39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability 39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability 39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability 39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability 39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability 39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability 39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability 39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability 39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability 39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability 39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability 39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability 39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability 39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability 39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability 39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability 39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability 39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability 39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability 39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability 39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability 39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability 39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability 37926 Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability 39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability 39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability 35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability 34961 Cyrus SASL 'sasl_encode64()' Remote Buffer Overflow Vulnerability 38016 Sun Solaris 'CODE_GET_VERSION IOCTL' Local Denial Of Service Vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201004-0739", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 10 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1.1" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.0" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.5" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1" }, { "model": "ray server software", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6.1" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3.1" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.2" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system directory server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "java system directory server patch6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server patch4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server patch3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server patch2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server 2005q4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server 2005q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server 2003q4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.2" }, { "model": "java system directory server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.0" }, { "model": "java system communications express", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3" }, { "model": "java system communications express 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system communications express 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system communications express 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system communications express", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "java system access manager windows", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.1" }, { "model": "java system access manager solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.1x86" }, { "model": "java system access manager solaris sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.1" }, { "model": "java system access manager linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.1" }, { "model": "java system access manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.1" }, { "model": "java system access manager 2005q4 windows", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system access manager 2005q4 solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0x" }, { "model": "java system access manager 2005q4 solaris s", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system access manager 2005q4 linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system access manager 2005q4 hp-ux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system access manager 2005q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3x86" }, { "model": "java system access manager 2005q1 sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3" }, { "model": "java system access manager 2005q1 linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.3" }, { "model": "java system access manager 2004q2 solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.2x" }, { "model": "java system access manager 2004q2 solaris s", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.2" }, { "model": "java system access manager 2004q2 linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.2" }, { "model": "java system access manager", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.2" }, { "model": "java system access manager", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "java system access manager 2005q1 windows", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6" }, { "model": "java system access manager 2005q1 solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6x86" }, { "model": "java system access manager 2005q1 solaris spa", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6" }, { "model": "java system access manager 2005q1 linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6" }, { "model": "java system access manager 2005q1 2005q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6" }, { "model": "convergence", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.2" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.2" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.19/04" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.14/04" }, { "model": "transportation manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.0.3" }, { "model": "transportation manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.5.06.00" }, { "model": "transportation manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.5.05.07" }, { "model": "thesaurus management system", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.6.1" }, { "model": "thesaurus management system", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.5.2" }, { "model": "thesaurus management system", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.6" }, { "model": "retail plan in-season", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2" }, { "model": "retail place in-season", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2" }, { "model": "retail markdown optimization", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "13.1" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49.23" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49.21" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49.14" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49.12" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49.9" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.50" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49" }, { "model": "oracle9i standard edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "oracle9i personal edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i enterprise edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8.0" }, { "model": "oracle11g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.7" }, { "model": "oracle11g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.2.0.1.0" }, { "model": "oracle11g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.2.0.1.0" }, { "model": "oracle11g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.0.7" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.5" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "identity management 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.4.3.0" }, { "model": "identity management 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.4.0.1" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1212.1.2" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1212.1.1" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1212.0.5" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1212.0.4" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10.2" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0.6" }, { "model": "communications unified inventory management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.1" }, { "model": "collaboration suite release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.4" }, { "model": "clinical remote data capture option", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.5.3" }, { "model": "clinical remote data capture option", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.6" }, { "model": "application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.3" }, { "model": "agile engineering data management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.1.1.0" } ], "sources": [ { "db": "BID", "id": "39333" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle", "sources": [ { "db": "BID", "id": "39333" } ], "trust": 0.3 }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software:\nOracle Database\nOracle Fusion Middleware\nOracle Collaboration Suite\nOracle E-Business Suite\nOracle PeopleSoft Enterprise and JD Edwards EnterpriseOne\nOracle Industry Suite\nOracle Solaris Products\nThe following individual records exist to better document these issues:\n39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities\n39459 Oracle Solaris CVE-2010-0890 Local Vulnerability\n39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability\n39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability\n39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability\n39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability\n39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability\n39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability\n39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability\n39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability\n39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability\n39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability\n39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability\n39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability\n39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability\n39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability\n39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability\n39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability\n39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability\n39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability\n39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability\n39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability\n39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability\n39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability\n39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability\n39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability\n39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability\n39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability\n39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability\n39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability\n39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability\n39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability\n39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability\n39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability\n39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability\n39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability\n39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability\n39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability\n39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability\n39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability\n39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability\n39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability\n37926 Oracle WebLogic Server Node Manager \u0027beasvc.exe\u0027 Remote Command Execution Vulnerability\n39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability\n39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability\n35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability\n34961 Cyrus SASL \u0027sasl_encode64()\u0027 Remote Buffer Overflow Vulnerability\n38016 Sun Solaris \u0027CODE_GET_VERSION IOCTL\u0027 Local Denial Of Service Vulnerability", "sources": [ { "db": "BID", "id": "39333" } ], "trust": 0.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "39333", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "39333" } ] }, "id": "VAR-201004-0739", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.17738096 }, "last_update_date": "2022-05-17T02:01:26.079000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html" }, { "trust": 0.3, "url": "http://www.oracle.com" } ], "sources": [ { "db": "BID", "id": "39333" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "39333" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-04-08T00:00:00", "db": "BID", "id": "39333" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-04-15T01:04:00", "db": "BID", "id": "39333" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "39333" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "RETIRED: Oracle April 2010 Critical Patch Update Multiple Vulnerabilities", "sources": [ { "db": "BID", "id": "39333" } ], "trust": 0.3 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "39333" } ], "trust": 0.3 } }
var-200311-0091
Vulnerability from variot
Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding. Multiple vulnerabilities exist in different vendors' SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL of ASN.1 (Abstract Syntax Notation number One) Structure (ASN1_TYPE) In the interpretation part of, there is a flaw in the process of releasing the memory allocated for the structure, and there is a vulnerability that destroys the values in the stack.OpenSSL Service disruption (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----
OpenSSL Security Advisory [30 September 2003]
Vulnerabilities in ASN.1 parsing
NISCC (www.niscc.gov.uk) prepared a test suite to check the operation of SSL/TLS software when presented with a wide range of malformed client certificates.
Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team identified and prepared fixes for a number of vulnerabilities in the OpenSSL ASN1 code when running the test suite.
Vulnerabilities
-
Certain ASN.1 encodings that are rejected as invalid by the parser can trigger a bug in the deallocation of the corresponding data structure, corrupting the stack. This can be used as a denial of service attack. It is currently unknown whether this can be exploited to run malicious code. This issue does not affect OpenSSL 0.9.6.
-
Exploitation of an affected application would result in a denial of service vulnerability.
-
This by itself is not strictly speaking a vulnerability but it does mean that all SSL/TLS servers that use OpenSSL can be attacked using vulnerabilities 1, 2 and 3 even if they don't enable client authentication.
Who is affected?
All versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all versions of SSLeay are affected.
Any application that makes use of OpenSSL's ASN1 library to parse untrusted data. This includes all SSL or TLS applications, those using S/MIME (PKCS#7) or certificate generation routines.
Recommendations
Upgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications statically linked to OpenSSL libraries.
References
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0545 for issue 1:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
and CAN-2003-0543 and CAN-2003-0544 for issue 2:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
URL for this Security Advisory: http://www.openssl.org/news/secadv_20030930.txt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q x4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS 3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un xjGKYbcITrM= =fFTe -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200311-0091", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 4.0, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6" }, { "model": "ios 12.1 e", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "9.0.1" }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "8.1.7" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security ab", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cray", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ingrian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sgi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "secure computing", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stunnel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tawie server linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "turbolinux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wirex", "version": null }, { "model": "openssl", "scope": "lte", "trust": 0.8, "vendor": "openssl", "version": "0.9.7b" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.2s" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.3" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8.1.7" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.1" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.2.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.2" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "1.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.3" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "hp-ux apache-based web server", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.15336" }, { "model": "esx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.05257" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5.2" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.30" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.200" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.11" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.10" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.01" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1x86" }, { "model": "one directory server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "grid engine", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3x86" }, { "model": "grid engine sun linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 64-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 32-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat high availability", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.1" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for isa server", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for gauntlet", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.8.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.6.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.8" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.7" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1" }, { "model": "communications security ssh sentinel", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ipsec express toolkit", "scope": null, "trust": 0.3, "vendor": "ssh", "version": null }, { "model": "os", "scope": "eq", "trust": 0.3, "vendor": "snapgear", "version": "1.8.4" }, { "model": "gpl", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "1.0" }, { "model": "express beta", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "2.0" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.3" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.2.1" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "oracle9i application server .1s", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.4" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.3" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.2" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.1" }, { "model": "nsure audit", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.0.1" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.1" }, { "model": "netmail e", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail d", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail c", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.1" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0.2" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.5" }, { "model": "ichain server sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "groupwise webaccess sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "groupwise internet agent", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5.1" }, { "model": "groupwise sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "edirectory su1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.6.2" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.27" }, { "model": "edirectory a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.12" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.0" }, { "model": "bordermanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.8" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake ppc", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "8.2" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "networks t-series router t640", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks t-series router t320", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1.1" }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1" }, { "model": "networks m-series router m5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40e", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m160", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "rational rose", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2000" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.47" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.28" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.26" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.19" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.4" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.2" }, { "model": "hp-ux aaa server a.06.01.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "wbem services for hp-ux a.01.05.05", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "isman", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "firepass", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.3" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.1" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.3" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.0.1" }, { "model": "open software", "scope": "eq", "trust": 0.3, "vendor": "cray", "version": "3.4" }, { "model": "associates etrust security command center", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "threat response", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sn storage router sn5428-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2.5.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure policy manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "520" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "515" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "ciscoworks wireless lan solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "ciscoworks hosting solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software vpn-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software nokia voyager", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software next generation fp3 hf2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3 hf1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp8", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp7", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "3.0" }, { "model": "firewall server", "scope": "eq", "trust": 0.3, "vendor": "borderware", "version": "7.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "3.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "enterprise", "scope": "ne", "trust": 0.3, "vendor": "tarantella", "version": "33.40" }, { "model": "solaris 8 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one web server sp7", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp14", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server sp3", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 upgrade standard", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 upgrade platform", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp1", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.2" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "3.2.9" }, { "model": "communications security ssh sentinel", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "1.4.1" }, { "model": "os", "scope": "ne", "trust": 0.3, "vendor": "snapgear", "version": "1.8.5" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.3" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.2" }, { "model": "netmail f", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "imanager", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.5" }, { "model": "edirectory su1", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "rational requisitepro", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "hp-ux aaa server a.06.01.02.04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem services for hp-ux a.01.05.07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "CNNVD", "id": "CNNVD-200311-033" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0545" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NISCC uniras@niscc.gov.uk", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-033" } ], "trust": 0.6 }, "cve": "CVE-2003-0545", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2003-0545", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2003-0545", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-0545", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#104280", "trust": 0.8, "value": "11.81" }, { "author": "CARNEGIE MELLON", "id": "VU#732952", "trust": 0.8, "value": "2.53" }, { "author": "CARNEGIE MELLON", "id": "VU#686224", "trust": 0.8, "value": "1.50" }, { "author": "CARNEGIE MELLON", "id": "VU#935264", "trust": 0.8, "value": "21.52" }, { "author": "CARNEGIE MELLON", "id": "VU#380864", "trust": 0.8, "value": "11.25" }, { "author": "CARNEGIE MELLON", "id": "VU#255484", "trust": 0.8, "value": "11.25" }, { "author": "CNNVD", "id": "CNNVD-200311-033", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "CNNVD", "id": "CNNVD-200311-033" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding. Multiple vulnerabilities exist in different vendors\u0027 SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL of ASN.1 (Abstract Syntax Notation number One) Structure (ASN1_TYPE) In the interpretation part of, there is a flaw in the process of releasing the memory allocated for the structure, and there is a vulnerability that destroys the values in the stack.OpenSSL Service disruption (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----\n\nOpenSSL Security Advisory [30 September 2003]\n\nVulnerabilities in ASN.1 parsing\n================================\n\nNISCC (www.niscc.gov.uk) prepared a test suite to check the operation\nof SSL/TLS software when presented with a wide range of malformed client\ncertificates. \n\nDr Stephen Henson (steve@openssl.org) of the OpenSSL core team\nidentified and prepared fixes for a number of vulnerabilities in the\nOpenSSL ASN1 code when running the test suite. \n\nVulnerabilities\n- ---------------\n\n1. Certain ASN.1 encodings that are rejected as invalid by the parser\ncan trigger a bug in the deallocation of the corresponding data\nstructure, corrupting the stack. This can be used as a denial of service\nattack. It is currently unknown whether this can be exploited to run\nmalicious code. This issue does not affect OpenSSL 0.9.6. \n\n2. \n\n3. Exploitation of an affected\napplication would result in a denial of service vulnerability. \n\n4. This by\nitself is not strictly speaking a vulnerability but it does mean that\n*all* SSL/TLS servers that use OpenSSL can be attacked using\nvulnerabilities 1, 2 and 3 even if they don\u0027t enable client authentication. \n\nWho is affected?\n- ----------------\n\nAll versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all\nversions of SSLeay are affected. \n\nAny application that makes use of OpenSSL\u0027s ASN1 library to parse\nuntrusted data. This includes all SSL or TLS applications, those using\nS/MIME (PKCS#7) or certificate generation routines. \n\nRecommendations\n- ---------------\n\nUpgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications\nstatically linked to OpenSSL libraries. \n\nReferences\n- ----------\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0545 for issue 1:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545\n\nand CAN-2003-0543 and CAN-2003-0544 for issue 2:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20030930.txt\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q\nx4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS\n3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un\nxjGKYbcITrM=\n=fFTe\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2003-0545" }, { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "BID", "id": "8732" }, { "db": "PACKETSTORM", "id": "31738" } ], "trust": 6.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#935264", "trust": 3.5 }, { "db": "NVD", "id": "CVE-2003-0545", "trust": 2.8 }, { "db": "BID", "id": "8732", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#732952", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#686224", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#104280", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3900", "trust": 1.6 }, { "db": "SECUNIA", "id": "22249", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#380864", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#255484", "trust": 1.1 }, { "db": "XF", "id": "13315", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000287", "trust": 0.8 }, { "db": "CERT/CC", "id": "CA-2003-26", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:2590", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:292", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-394", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200311-033", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "31738", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-033" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "id": "VAR-200311-0091", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2022-05-29T21:30:21.532000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "title": "HPSBUX00290", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0310-290" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0310-284" }, { "title": "HPSBUX00288", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00891831" }, { "title": "HPSBUX00290", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0310-290.html" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0310-284.html" }, { "title": "openssl", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/openssl.html" }, { "title": "secadv_20030930", "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "title": "#62", "trust": 0.8, "url": "http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf" }, { "title": "#62", "trust": 0.8, "url": "http://support.oracle.co.jp/open/owa/external_krown.search_doc?c_document_id=70482" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2003-292.html" }, { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20030930-ssl-j.shtml" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-292j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000287" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.8, "url": "http://www.ietf.org/rfc/rfc2246.txt" }, { "trust": 4.5, "url": "http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm" }, { "trust": 4.0, "url": "http://wp.netscape.com/eng/ssl3/" }, { "trust": 4.0, "url": "http://www.itu.int/itu-t/studygroups/com10/languages/" }, { "trust": 3.9, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "trust": 3.2, "url": "http://www.ietf.org/html.charters/pkix-charter.html" }, { "trust": 2.7, "url": "http://www.cert.org/advisories/ca-2003-26.html" }, { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/935264" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/8732" }, { "trust": 1.9, "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21247112" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-292.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2003/dsa-394" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22249" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/686224" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/732952" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3900" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2590" }, { "trust": 0.9, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10087450.htm" }, { "trust": 0.8, "url": "http://www.uniras.gov.uk/vuls/2003/006489/tls.htm" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/pkcs/" }, { "trust": 0.8, "url": "http://wp.netscape.com/eng/ssl3/draft302.txt" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/n-159.shtml" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/o-065.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0545" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20031104-00753.xml" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/13315" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2003-26" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trca-2003-26" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0545" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20031104-00753.pdf?lang=en" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/104280" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20031001_103420.html" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3900" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2590" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-tech.shtml" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120400.shtml" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57599" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.apple.com/swupdates/" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967586.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968007.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/esx/esx2-openssh.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967420.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967421.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/products/firewall.php" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967425.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967411.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967408.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967399.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/gsx_security.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967175.htm" }, { "trust": 0.3, "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=mdksa-2003:098" }, { "trust": 0.3, "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2004.0422.1" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967210.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967209.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967208.htm" }, { "trust": 0.3, "url": "http://cirt.dk/advisories/cirt-32-advisory.pdf" }, { "trust": 0.3, "url": "http://www.cirt.dk/advisories/cirt-31-advisory.pdf" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3040.html" }, { "trust": 0.3, "url": "http://metalink.oracle.com" }, { "trust": 0.3, "url": "http://www.smoothwall.org/home/news/item/20031001.01.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-331.php" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2003-293.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_asn_vulnerability.html" }, { "trust": 0.3, "url": "http://support.novell.com/security-alerts/" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3041.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/476/" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/477/" }, { "trust": 0.3, "url": "http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57100" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57444" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57472" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57475" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57498" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/patches/linux/security.html" }, { "trust": 0.3, "url": "http://www.tarantella.com/security/bulletin-08.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097379.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/255484" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/380864" }, { "trust": 0.3, "url": "/archive/1/343055" }, { "trust": 0.1, "url": "https://www.niscc.gov.uk)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0543" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0544" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0544" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-033" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-033" }, { "db": "NVD", "id": "CVE-2003-0545" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2003-09-30T00:00:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "date": "2003-09-30T16:10:22", "db": "PACKETSTORM", "id": "31738" }, { "date": "2003-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-033" }, { "date": "2003-11-17T05:00:00", "db": "NVD", "id": "CVE-2003-0545" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-25T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2016-07-06T14:32:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000287" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-033" }, { "date": "2018-05-03T01:29:00", "db": "NVD", "id": "CVE-2003-0545" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in SSL/TLS implementations", "sources": [ { "db": "CERT/CC", "id": "VU#104280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-033" } ], "trust": 0.6 } }
var-200311-0089
Vulnerability from variot
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values. Multiple vulnerabilities exist in different vendors' SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL Is X.509 With a certificate etc. ASN.1 Authentication information is exchanged using objects. OpenSSL 0.9.6j/0.9.7b Before ASN.1 An integer overflow vulnerability exists due to insufficient bounds checking on the value of the object's tag field. In addition, SSL/TLS Implement the protocol OpenSSL Many other products also contain this vulnerability ASN.1 The existence of vulnerabilities related to processing has been confirmed.Third party crafted ASN.1 The client certificate containing the object SSL/TSL Etc. OpenSSL By passing it through an application implemented using OpenSSL Service disruption (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----
OpenSSL Security Advisory [30 September 2003]
Vulnerabilities in ASN.1 parsing
NISCC (www.niscc.gov.uk) prepared a test suite to check the operation of SSL/TLS software when presented with a wide range of malformed client certificates.
Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team identified and prepared fixes for a number of vulnerabilities in the OpenSSL ASN1 code when running the test suite.
Vulnerabilities
-
Certain ASN.1 encodings that are rejected as invalid by the parser can trigger a bug in the deallocation of the corresponding data structure, corrupting the stack. This can be used as a denial of service attack. It is currently unknown whether this can be exploited to run malicious code. This issue does not affect OpenSSL 0.9.6.
-
Exploitation of an affected application would result in a denial of service vulnerability.
-
This by itself is not strictly speaking a vulnerability but it does mean that all SSL/TLS servers that use OpenSSL can be attacked using vulnerabilities 1, 2 and 3 even if they don't enable client authentication.
Who is affected?
All versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all versions of SSLeay are affected.
Any application that makes use of OpenSSL's ASN1 library to parse untrusted data. This includes all SSL or TLS applications, those using S/MIME (PKCS#7) or certificate generation routines.
Recommendations
Upgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications statically linked to OpenSSL libraries.
References
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0545 for issue 1:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
and CAN-2003-0543 and CAN-2003-0544 for issue 2:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
URL for this Security Advisory: http://www.openssl.org/news/secadv_20030930.txt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q x4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS 3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un xjGKYbcITrM= =fFTe -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200311-0089", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 4.0, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6" }, { "model": "ios 12.1 e", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "9.0.1" }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "8.1.7" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security ab", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cray", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ingrian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sgi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "secure computing", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stunnel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tawie server linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "turbolinux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wirex", "version": null }, { "model": "openssl", "scope": "lte", "trust": 0.8, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "lte", "trust": 0.8, "vendor": "openssl", "version": "0.9.7b" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.2s" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.3" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8.1.7" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.1" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.2.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.2" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "1.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "cobalt qube3", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq3", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq4", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq550", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raqxtr", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "java system application server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "7 platform edition update 2" }, { "model": "java system application server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "7 standard edition update 2" }, { "model": "java system directory server", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "5.1" }, { "model": "java system web server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "4.1 sp13" }, { "model": "java system web server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "6.0 sp6" }, { "model": "java system web server", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "6.1" }, { "model": "linux 5.0", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.3" }, { "model": "turbolinux advanced server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6" }, { "model": "turbolinux desktop", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.1" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.5" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.0" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "hp-ux apache-based web server", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.15336" }, { "model": "esx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.05257" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5.2" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.30" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.200" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.11" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.10" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.01" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1x86" }, { "model": "one directory server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "grid engine", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3x86" }, { "model": "grid engine sun linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 64-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 32-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat high availability", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.1" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for isa server", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for gauntlet", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.8.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.6.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.8" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.7" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1" }, { "model": "communications security ssh sentinel", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ipsec express toolkit", "scope": null, "trust": 0.3, "vendor": "ssh", "version": null }, { "model": "os", "scope": "eq", "trust": 0.3, "vendor": "snapgear", "version": "1.8.4" }, { "model": "gpl", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "1.0" }, { "model": "express beta", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "2.0" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.3" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.2.1" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "oracle9i application server .1s", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.4" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.3" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.2" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.1" }, { "model": "nsure audit", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.0.1" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.1" }, { "model": "netmail e", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail d", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail c", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.1" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0.2" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.5" }, { "model": "ichain server sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "groupwise webaccess sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "groupwise internet agent", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5.1" }, { "model": "groupwise sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "edirectory su1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.6.2" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.27" }, { "model": "edirectory a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.12" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.0" }, { "model": "bordermanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.8" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake ppc", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "8.2" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "networks t-series router t640", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks t-series router t320", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1.1" }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1" }, { "model": "networks m-series router m5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40e", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m160", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "rational rose", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2000" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.47" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.28" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.26" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.19" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.4" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.2" }, { "model": "hp-ux aaa server a.06.01.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "wbem services for hp-ux a.01.05.05", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "isman", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "firepass", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.3" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.1" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.3" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.0.1" }, { "model": "open software", "scope": "eq", "trust": 0.3, "vendor": "cray", "version": "3.4" }, { "model": "associates etrust security command center", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "threat response", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sn storage router sn5428-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2.5.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure policy manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "520" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "515" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "ciscoworks wireless lan solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "ciscoworks hosting solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software vpn-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software nokia voyager", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software next generation fp3 hf2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3 hf1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp8", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp7", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "3.0" }, { "model": "firewall server", "scope": "eq", "trust": 0.3, "vendor": "borderware", "version": "7.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "3.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "enterprise", "scope": "ne", "trust": 0.3, "vendor": "tarantella", "version": "33.40" }, { "model": "solaris 8 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one web server sp7", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp14", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server sp3", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 upgrade standard", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 upgrade platform", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp1", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.2" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "3.2.9" }, { "model": "communications security ssh sentinel", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "1.4.1" }, { "model": "os", "scope": "ne", "trust": 0.3, "vendor": "snapgear", "version": "1.8.5" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.3" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.2" }, { "model": "netmail f", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "imanager", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.5" }, { "model": "edirectory su1", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "rational requisitepro", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "hp-ux aaa server a.06.01.02.04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem services for hp-ux a.01.05.07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "CNNVD", "id": "CNNVD-200311-070" }, { "db": "NVD", "id": "CVE-2003-0543" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0543" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NISCC uniras@niscc.gov.uk", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-070" } ], "trust": 0.6 }, "cve": "CVE-2003-0543", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2003-0543", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-0543", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#104280", "trust": 0.8, "value": "11.81" }, { "author": "CARNEGIE MELLON", "id": "VU#732952", "trust": 0.8, "value": "2.53" }, { "author": "CARNEGIE MELLON", "id": "VU#686224", "trust": 0.8, "value": "1.50" }, { "author": "CARNEGIE MELLON", "id": "VU#935264", "trust": 0.8, "value": "21.52" }, { "author": "CARNEGIE MELLON", "id": "VU#380864", "trust": 0.8, "value": "11.25" }, { "author": "CARNEGIE MELLON", "id": "VU#255484", "trust": 0.8, "value": "11.25" }, { "author": "CNNVD", "id": "CNNVD-200311-070", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "CNNVD", "id": "CNNVD-200311-070" }, { "db": "NVD", "id": "CVE-2003-0543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values. Multiple vulnerabilities exist in different vendors\u0027 SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL Is X.509 With a certificate etc. ASN.1 Authentication information is exchanged using objects. OpenSSL 0.9.6j/0.9.7b Before ASN.1 An integer overflow vulnerability exists due to insufficient bounds checking on the value of the object\u0027s tag field. In addition, SSL/TLS Implement the protocol OpenSSL Many other products also contain this vulnerability ASN.1 The existence of vulnerabilities related to processing has been confirmed.Third party crafted ASN.1 The client certificate containing the object SSL/TSL Etc. OpenSSL By passing it through an application implemented using OpenSSL Service disruption (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----\n\nOpenSSL Security Advisory [30 September 2003]\n\nVulnerabilities in ASN.1 parsing\n================================\n\nNISCC (www.niscc.gov.uk) prepared a test suite to check the operation\nof SSL/TLS software when presented with a wide range of malformed client\ncertificates. \n\nDr Stephen Henson (steve@openssl.org) of the OpenSSL core team\nidentified and prepared fixes for a number of vulnerabilities in the\nOpenSSL ASN1 code when running the test suite. \n\nVulnerabilities\n- ---------------\n\n1. Certain ASN.1 encodings that are rejected as invalid by the parser\ncan trigger a bug in the deallocation of the corresponding data\nstructure, corrupting the stack. This can be used as a denial of service\nattack. It is currently unknown whether this can be exploited to run\nmalicious code. This issue does not affect OpenSSL 0.9.6. \n\n2. \n\n3. Exploitation of an affected\napplication would result in a denial of service vulnerability. \n\n4. This by\nitself is not strictly speaking a vulnerability but it does mean that\n*all* SSL/TLS servers that use OpenSSL can be attacked using\nvulnerabilities 1, 2 and 3 even if they don\u0027t enable client authentication. \n\nWho is affected?\n- ----------------\n\nAll versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all\nversions of SSLeay are affected. \n\nAny application that makes use of OpenSSL\u0027s ASN1 library to parse\nuntrusted data. This includes all SSL or TLS applications, those using\nS/MIME (PKCS#7) or certificate generation routines. \n\nRecommendations\n- ---------------\n\nUpgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications\nstatically linked to OpenSSL libraries. \n\nReferences\n- ----------\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0545 for issue 1:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545\n\nand CAN-2003-0543 and CAN-2003-0544 for issue 2:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20030930.txt\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q\nx4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS\n3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un\nxjGKYbcITrM=\n=fFTe\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2003-0543" }, { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "BID", "id": "8732" }, { "db": "PACKETSTORM", "id": "31738" } ], "trust": 6.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#255484", "trust": 3.5 }, { "db": "NVD", "id": "CVE-2003-0543", "trust": 2.8 }, { "db": "BID", "id": "8732", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#732952", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#686224", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#104280", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3900", "trust": 1.6 }, { "db": "SECUNIA", "id": "22249", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#935264", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#380864", "trust": 1.1 }, { "db": "XF", "id": "13316", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000286", "trust": 0.8 }, { "db": "CERT/CC", "id": "CA-2003-26", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:291", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:292", "trust": 0.6 }, { "db": "SUNALERT", "id": "201029", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:4254", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:5292", "trust": 0.6 }, { "db": "ENGARDE", "id": "ESA-20030930-027", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-394", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-393", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200311-070", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "31738", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-070" }, { "db": "NVD", "id": "CVE-2003-0543" } ] }, "id": "VAR-200311-0089", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2022-05-29T19:17:04.347000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "title": "HPSBUX00288", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00891831" }, { "title": "HPSBUX00290", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00901847" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0310-284" }, { "title": "HPSBUX0310-290", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0310-290.html" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0310-284.html" }, { "title": "openssl", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/openssl.html" }, { "title": "secadv_20030930", "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "title": "#62", "trust": 0.8, "url": "http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2003-292.html" }, { "title": "RHSA-2003:291", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2003-291.html" }, { "title": "RHSA-2003:293", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2003-293.html" }, { "title": "57472", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57472-1" }, { "title": "57100", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57100-1" }, { "title": "57498", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57498-1" }, { "title": "57599", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57599-1" }, { "title": "57498", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57498-3" }, { "title": "57472", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57472-3" }, { "title": "57100", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57100-3" }, { "title": "57599", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57599-3" }, { "title": "TLSA-2003-55", "trust": 0.8, "url": "http://www.turbolinux.com/security/2003/tlsa-2003-55.txt" }, { "title": "#62", "trust": 0.8, "url": "http://otn.oracle.co.jp/security/031210_62/top.html" }, { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20030930-ssl-j.shtml" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-292j.html" }, { "title": "RHSA-2003:291", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-291j.html" }, { "title": "RHSA-2003:293", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-293j.html" }, { "title": "TLSA-2003-55", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2003/tlsa-2003-55j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000286" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0543" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.1, "url": "http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm" }, { "trust": 4.8, "url": "http://www.ietf.org/rfc/rfc2246.txt" }, { "trust": 4.0, "url": "http://wp.netscape.com/eng/ssl3/" }, { "trust": 4.0, "url": "http://www.itu.int/itu-t/studygroups/com10/languages/" }, { "trust": 3.9, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "trust": 3.2, "url": "http://www.ietf.org/html.charters/pkix-charter.html" }, { "trust": 2.7, "url": "http://www.cert.org/advisories/ca-2003-26.html" }, { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/255484" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/8732" }, { "trust": 1.9, "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21247112" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-291.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-292.html" }, { "trust": 1.6, "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-3693.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2003/dsa-394" }, { "trust": 1.6, "url": "http://www.debian.org/security/2003/dsa-393" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201029-1" }, { "trust": 1.6, "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=104893" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22249" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/686224" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/732952" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3900" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5292" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a4254" }, { "trust": 0.9, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10087450.htm" }, { "trust": 0.8, "url": "http://www.uniras.gov.uk/vuls/2003/006489/tls.htm" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/pkcs/" }, { "trust": 0.8, "url": "http://wp.netscape.com/eng/ssl3/draft302.txt" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/n-159.shtml" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/o-065.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0543" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20031104-00753.xml" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/advisories/default.aspx?id=br-20031104-00633.xml" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/13316" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2003-26" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trca-2003-26" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0543" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20031104-00748.pdf" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20031104-00753.pdf?lang=en" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/104280" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20031001_103420.html" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5292" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3900" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:4254" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-tech.shtml" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120400.shtml" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57599" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.apple.com/swupdates/" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967586.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968007.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/esx/esx2-openssh.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967420.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967421.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/products/firewall.php" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967425.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967411.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967408.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967399.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/gsx_security.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967175.htm" }, { "trust": 0.3, "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=mdksa-2003:098" }, { "trust": 0.3, "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2004.0422.1" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967210.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967209.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967208.htm" }, { "trust": 0.3, "url": "http://cirt.dk/advisories/cirt-32-advisory.pdf" }, { "trust": 0.3, "url": "http://www.cirt.dk/advisories/cirt-31-advisory.pdf" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3040.html" }, { "trust": 0.3, "url": "http://metalink.oracle.com" }, { "trust": 0.3, "url": "http://www.smoothwall.org/home/news/item/20031001.01.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-331.php" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2003-293.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_asn_vulnerability.html" }, { "trust": 0.3, "url": "http://support.novell.com/security-alerts/" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3041.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/476/" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/477/" }, { "trust": 0.3, "url": "http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57100" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57444" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57472" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57475" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57498" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/patches/linux/security.html" }, { "trust": 0.3, "url": "http://www.tarantella.com/security/bulletin-08.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097379.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/380864" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/935264" }, { "trust": 0.3, "url": "/archive/1/343055" }, { "trust": 0.1, "url": "https://www.niscc.gov.uk)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0543" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0544" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0544" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-070" }, { "db": "NVD", "id": "CVE-2003-0543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-070" }, { "db": "NVD", "id": "CVE-2003-0543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2003-09-30T00:00:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "date": "2003-09-30T16:10:22", "db": "PACKETSTORM", "id": "31738" }, { "date": "2003-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-070" }, { "date": "2003-11-17T05:00:00", "db": "NVD", "id": "CVE-2003-0543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-25T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2016-07-06T14:32:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000286" }, { "date": "2010-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-070" }, { "date": "2018-05-03T01:29:00", "db": "NVD", "id": "CVE-2003-0543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-070" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in SSL/TLS implementations", "sources": [ { "db": "CERT/CC", "id": "VU#104280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "8732" }, { "db": "CNNVD", "id": "CNNVD-200311-070" } ], "trust": 0.9 } }
var-200311-0090
Vulnerability from variot
OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used. Multiple vulnerabilities exist in different vendors' SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL Is X.509 With a certificate etc. ASN.1 Authentication information is exchanged using objects. In addition, SSL/TLS Implement the protocol OpenSSL Many other products also contain this vulnerability ASN.1 The existence of vulnerabilities related to processing has been confirmed.Crafted by a third party ASN.1 The client certificate containing the object OpenSSL By passing it to the application that uses (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----
OpenSSL Security Advisory [30 September 2003]
Vulnerabilities in ASN.1 parsing
NISCC (www.niscc.gov.uk) prepared a test suite to check the operation of SSL/TLS software when presented with a wide range of malformed client certificates.
Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team identified and prepared fixes for a number of vulnerabilities in the OpenSSL ASN1 code when running the test suite.
Vulnerabilities
-
Certain ASN.1 encodings that are rejected as invalid by the parser can trigger a bug in the deallocation of the corresponding data structure, corrupting the stack. This can be used as a denial of service attack. It is currently unknown whether this can be exploited to run malicious code. This issue does not affect OpenSSL 0.9.6.
-
Exploitation of an affected application would result in a denial of service vulnerability.
-
This by itself is not strictly speaking a vulnerability but it does mean that all SSL/TLS servers that use OpenSSL can be attacked using vulnerabilities 1, 2 and 3 even if they don't enable client authentication.
Who is affected?
All versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all versions of SSLeay are affected.
Any application that makes use of OpenSSL's ASN1 library to parse untrusted data. This includes all SSL or TLS applications, those using S/MIME (PKCS#7) or certificate generation routines.
Recommendations
Upgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications statically linked to OpenSSL libraries.
References
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0545 for issue 1:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
and CAN-2003-0543 and CAN-2003-0544 for issue 2:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
URL for this Security Advisory: http://www.openssl.org/news/secadv_20030930.txt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q x4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS 3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un xjGKYbcITrM= =fFTe -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200311-0090", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 4.0, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6" }, { "model": "ios 12.1 e", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "9.2.0" }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "9.0.1" }, { "model": "http server", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "8.1.7" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security ab", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cray", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ingrian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sgi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "secure computing", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stunnel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tawie server linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "turbolinux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wirex", "version": null }, { "model": "openssl", "scope": "lte", "trust": 0.8, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "lte", "trust": 0.8, "vendor": "openssl", "version": "0.9.7b" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.1s" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.2" }, { "model": "application server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.3" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8.1.7" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.0.1" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9.2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "1.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "cobalt qube3", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq4", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq550", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raqxtr", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "java system application server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "7 platform edition update 2" }, { "model": "java system application server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "7 standard edition update 2" }, { "model": "java system directory server", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "5.1" }, { "model": "java system web server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "4.1 sp13" }, { "model": "java system web server", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "6.0 sp6" }, { "model": "java system web server", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "6.1" }, { "model": "linux 5.0", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.3" }, { "model": "turbolinux advanced server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6" }, { "model": "turbolinux desktop", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.1" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.5" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.0" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "hp-ux apache-based web server", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.15336" }, { "model": "esx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.05257" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5.2" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.30" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.200" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.11" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.10" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.01" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1x86" }, { "model": "one directory server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one directory server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur1 platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "grid engine", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3x86" }, { "model": "grid engine sun linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 64-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "grid engine 32-bit sparc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.3" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.1" }, { "model": "cluster", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat high availability", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.1" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for isa server", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for gauntlet", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.9" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.8.1" }, { "model": "ssleay", "scope": "eq", "trust": 0.3, "vendor": "ssleay", "version": "0.6.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.8" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.7" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.6" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.5" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.4" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.3" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.2" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1.1" }, { "model": "communications security ssh2", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "3.1" }, { "model": "communications security ssh sentinel", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ipsec express toolkit", "scope": null, "trust": 0.3, "vendor": "ssh", "version": null }, { "model": "os", "scope": "eq", "trust": 0.3, "vendor": "snapgear", "version": "1.8.4" }, { "model": "gpl", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "1.0" }, { "model": "express beta", "scope": "eq", "trust": 0.3, "vendor": "smoothwall", "version": "2.0" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.3" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.2.1" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "oracle9i application server .1s", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.4" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.3" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.2" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.1" }, { "model": "nsure audit", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.0.1" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.1" }, { "model": "netmail e", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail d", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail c", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.10" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "netmail b", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.3" }, { "model": "netmail", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.0.1" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0.2" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.0" }, { "model": "imanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.5" }, { "model": "ichain server sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server fp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "ichain server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.2" }, { "model": "groupwise webaccess sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise webaccess sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "groupwise internet agent", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5.1" }, { "model": "groupwise sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.5" }, { "model": "groupwise sp4", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "edirectory su1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.6.2" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.27" }, { "model": "edirectory a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.12" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5" }, { "model": "edirectory", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.0" }, { "model": "bordermanager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.8" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake ppc", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "8.2" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "networks t-series router t640", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks t-series router t320", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1.1" }, { "model": "networks sdx-300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "3.1" }, { "model": "networks m-series router m5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40e", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m160", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks m-series router m10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "rational rose", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2000" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.47" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.42" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.28" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.26" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.19" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.4" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.12.2" }, { "model": "hp-ux aaa server a.06.01.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "wbem services for hp-ux a.01.05.05", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "isman", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "firepass", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "bigip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.3" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.2" }, { "model": "ssh for windows", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.1" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.3" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.2.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.1.0" }, { "model": "ssh for unix", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "3.0.1" }, { "model": "open software", "scope": "eq", "trust": 0.3, "vendor": "cray", "version": "3.4" }, { "model": "associates etrust security command center", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "threat response", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "sn storage router sn5428-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2.5.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure policy manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "520" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "515" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "ciscoworks wireless lan solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "ciscoworks hosting solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software vpn-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software nokia voyager", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software next generation fp3 hf2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3 hf1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp8", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp7", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.0" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "3.0" }, { "model": "firewall server", "scope": "eq", "trust": 0.3, "vendor": "borderware", "version": "7.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "3.0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "enterprise", "scope": "ne", "trust": 0.3, "vendor": "tarantella", "version": "33.40" }, { "model": "solaris 8 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one web server sp7", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "one web server sp14", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.1" }, { "model": "one directory server sp3", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "5.1" }, { "model": "one application server ur2 upgrade standard", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "one application server ur2 upgrade platform", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp1", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.2" }, { "model": "cluster", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "3.2.9" }, { "model": "communications security ssh sentinel", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "1.4.1" }, { "model": "os", "scope": "ne", "trust": 0.3, "vendor": "snapgear", "version": "1.8.5" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.3" }, { "model": "nsure audit", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "1.0.2" }, { "model": "netmail f", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "imanager", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.5" }, { "model": "edirectory su1", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "rational requisitepro", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "hp-ux aaa server a.06.01.02.04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem services for hp-ux a.01.05.07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "CNNVD", "id": "CNNVD-200311-040" }, { "db": "NVD", "id": "CVE-2003-0544" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0544" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NISCC uniras@niscc.gov.uk", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-040" } ], "trust": 0.6 }, "cve": "CVE-2003-0544", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2003-0544", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-0544", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#104280", "trust": 0.8, "value": "11.81" }, { "author": "CARNEGIE MELLON", "id": "VU#732952", "trust": 0.8, "value": "2.53" }, { "author": "CARNEGIE MELLON", "id": "VU#686224", "trust": 0.8, "value": "1.50" }, { "author": "CARNEGIE MELLON", "id": "VU#935264", "trust": 0.8, "value": "21.52" }, { "author": "CARNEGIE MELLON", "id": "VU#380864", "trust": 0.8, "value": "11.25" }, { "author": "CARNEGIE MELLON", "id": "VU#255484", "trust": 0.8, "value": "11.25" }, { "author": "CNNVD", "id": "CNNVD-200311-040", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "CNNVD", "id": "CNNVD-200311-040" }, { "db": "NVD", "id": "CVE-2003-0544" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used. Multiple vulnerabilities exist in different vendors\u0027 SSL/TLS implementations. The impacts of these vulnerabilities include remote execution of arbitrary code, denial of service, and disclosure of sensitive information. OpenSSL accepts unsolicited client certificate messages. This vulnerability requires as a precondition that an application is configured to ignore public key decoding errors, which is typically only the case during debugging. OpenSSL Is X.509 With a certificate etc. ASN.1 Authentication information is exchanged using objects. In addition, SSL/TLS Implement the protocol OpenSSL Many other products also contain this vulnerability ASN.1 The existence of vulnerabilities related to processing has been confirmed.Crafted by a third party ASN.1 The client certificate containing the object OpenSSL By passing it to the application that uses (DoS) It may be in a state. Multiple vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. -----BEGIN PGP SIGNED MESSAGE-----\n\nOpenSSL Security Advisory [30 September 2003]\n\nVulnerabilities in ASN.1 parsing\n================================\n\nNISCC (www.niscc.gov.uk) prepared a test suite to check the operation\nof SSL/TLS software when presented with a wide range of malformed client\ncertificates. \n\nDr Stephen Henson (steve@openssl.org) of the OpenSSL core team\nidentified and prepared fixes for a number of vulnerabilities in the\nOpenSSL ASN1 code when running the test suite. \n\nVulnerabilities\n- ---------------\n\n1. Certain ASN.1 encodings that are rejected as invalid by the parser\ncan trigger a bug in the deallocation of the corresponding data\nstructure, corrupting the stack. This can be used as a denial of service\nattack. It is currently unknown whether this can be exploited to run\nmalicious code. This issue does not affect OpenSSL 0.9.6. \n\n2. \n\n3. Exploitation of an affected\napplication would result in a denial of service vulnerability. \n\n4. This by\nitself is not strictly speaking a vulnerability but it does mean that\n*all* SSL/TLS servers that use OpenSSL can be attacked using\nvulnerabilities 1, 2 and 3 even if they don\u0027t enable client authentication. \n\nWho is affected?\n- ----------------\n\nAll versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all\nversions of SSLeay are affected. \n\nAny application that makes use of OpenSSL\u0027s ASN1 library to parse\nuntrusted data. This includes all SSL or TLS applications, those using\nS/MIME (PKCS#7) or certificate generation routines. \n\nRecommendations\n- ---------------\n\nUpgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL applications\nstatically linked to OpenSSL libraries. \n\nReferences\n- ----------\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0545 for issue 1:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545\n\nand CAN-2003-0543 and CAN-2003-0544 for issue 2:\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20030930.txt\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q\nx4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS\n3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un\nxjGKYbcITrM=\n=fFTe\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2003-0544" }, { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "BID", "id": "8732" }, { "db": "PACKETSTORM", "id": "31738" } ], "trust": 6.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#380864", "trust": 3.5 }, { "db": "NVD", "id": "CVE-2003-0544", "trust": 2.8 }, { "db": "CERT/CC", "id": "VU#732952", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#686224", "trust": 1.9 }, { "db": "BID", "id": "8732", "trust": 1.9 }, { "db": "CERT/CC", "id": "VU#104280", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3900", "trust": 1.6 }, { "db": "SECUNIA", "id": "22249", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#935264", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#255484", "trust": 1.1 }, { "db": "XF", "id": "13316", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000288", "trust": 0.8 }, { "db": "CERT/CC", "id": "CA-2003-26", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:291", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:292", "trust": 0.6 }, { "db": "SUNALERT", "id": "201029", "trust": 0.6 }, { "db": "ENGARDE", "id": "ESA-20030930-027", "trust": 0.6 }, { "db": "XF", "id": "1", "trust": 0.6 }, { "db": "XF", "id": "43041", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-394", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-393", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:4574", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200311-040", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "31738", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-040" }, { "db": "NVD", "id": "CVE-2003-0544" } ] }, "id": "VAR-200311-0090", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2022-05-29T19:39:34.176000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "title": "HPSBUX00288", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00891831" }, { "title": "HPSBUX00290", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00901847" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0310-284" }, { "title": "HPSBUX0310-284", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0310-284.html" }, { "title": "openssl", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/openssl.html" }, { "title": "secadv_20030930", "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "title": "#62", "trust": 0.8, "url": "http://www.oracle.com/technology/deploy/security/pdf/2003alert62.pdf" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2003-292.html" }, { "title": "RHSA-2003:291", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2003-291.html" }, { "title": "RHSA-2003:293", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2003-293.html" }, { "title": "57599", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57599-1" }, { "title": "57472", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57472-1" }, { "title": "57100", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57100-1" }, { "title": "57498", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57498-1" }, { "title": "57498", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57498-3" }, { "title": "57599", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57599-3" }, { "title": "57472", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57472-3" }, { "title": "57100", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57100-3" }, { "title": "TLSA-2003-55", "trust": 0.8, "url": "http://www.turbolinux.com/security/2003/tlsa-2003-55.txt" }, { "title": "#62", "trust": 0.8, "url": "http://otn.oracle.co.jp/security/031210_62/top.html" }, { "title": "cisco-sa-20030930-ssl", "trust": 0.8, "url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20030930-ssl-j.shtml" }, { "title": "RHSA-2003:292", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-292j.html" }, { "title": "RHSA-2003:291", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-291j.html" }, { "title": "RHSA-2003:293", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-293j.html" }, { "title": "TLSA-2003-55", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2003/tlsa-2003-55j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000288" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0544" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.1, "url": "http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm" }, { "trust": 4.8, "url": "http://www.ietf.org/rfc/rfc2246.txt" }, { "trust": 4.0, "url": "http://wp.netscape.com/eng/ssl3/" }, { "trust": 4.0, "url": "http://www.itu.int/itu-t/studygroups/com10/languages/" }, { "trust": 3.9, "url": "http://www.openssl.org/news/secadv_20030930.txt" }, { "trust": 3.2, "url": "http://www.ietf.org/html.charters/pkix-charter.html" }, { "trust": 2.7, "url": "http://www.cert.org/advisories/ca-2003-26.html" }, { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/380864" }, { "trust": 1.9, "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21247112" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-292.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-291.html" }, { "trust": 1.6, "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-3693.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2003/dsa-394" }, { "trust": 1.6, "url": "http://www.debian.org/security/2003/dsa-393" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201029-1" }, { "trust": 1.6, "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=104893" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/8732" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22249" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/686224" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/732952" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3900" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43041" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a4574" }, { "trust": 0.9, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10087450.htm" }, { "trust": 0.8, "url": "http://www.uniras.gov.uk/vuls/2003/006489/tls.htm" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/pkcs/" }, { "trust": 0.8, "url": "http://wp.netscape.com/eng/ssl3/draft302.txt" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/n-159.shtml" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/o-065.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0544" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/advisories/default.aspx?id=br-20031104-00633.xml" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/13316" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2003-26" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trca-2003-26" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0544" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20031104-00748.pdf" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/104280" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20031001_103420.html" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/43041" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3900" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:4574" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-tech.shtml" }, { "trust": 0.3, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120400.shtml" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57599" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.apple.com/swupdates/" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967586.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968007.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/esx/esx2-openssh.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967420.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967421.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/products/firewall.php" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967425.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967411.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967408.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967399.htm" }, { "trust": 0.3, "url": "http://www.vmware.com/download/gsx_security.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967175.htm" }, { "trust": 0.3, "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=mdksa-2003:098" }, { "trust": 0.3, "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2004.0422.1" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967210.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967209.htm" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967208.htm" }, { "trust": 0.3, "url": "http://cirt.dk/advisories/cirt-32-advisory.pdf" }, { "trust": 0.3, "url": "http://www.cirt.dk/advisories/cirt-31-advisory.pdf" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3040.html" }, { "trust": 0.3, "url": "http://metalink.oracle.com" }, { "trust": 0.3, "url": "http://www.smoothwall.org/home/news/item/20031001.01.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-331.php" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2003-293.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_asn_vulnerability.html" }, { "trust": 0.3, "url": "http://support.novell.com/security-alerts/" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3041.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/476/" }, { "trust": 0.3, "url": "http://www.ssh.com/company/newsroom/article/477/" }, { "trust": 0.3, "url": "http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57100" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57444" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57472" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57475" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57498" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/patches/linux/security.html" }, { "trust": 0.3, "url": "http://www.tarantella.com/security/bulletin-08.html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097379.htm" }, { "trust": 0.3, "url": "http://www.borderware.com/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/255484" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/935264" }, { "trust": 0.3, "url": "/archive/1/343055" }, { "trust": 0.1, "url": "https://www.niscc.gov.uk)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0545" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0543" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0544" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0544" } ], "sources": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-040" }, { "db": "NVD", "id": "CVE-2003-0544" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#104280" }, { "db": "CERT/CC", "id": "VU#732952" }, { "db": "CERT/CC", "id": "VU#686224" }, { "db": "CERT/CC", "id": "VU#935264" }, { "db": "CERT/CC", "id": "VU#380864" }, { "db": "CERT/CC", "id": "VU#255484" }, { "db": "BID", "id": "8732" }, { "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "db": "PACKETSTORM", "id": "31738" }, { "db": "CNNVD", "id": "CNNVD-200311-040" }, { "db": "NVD", "id": "CVE-2003-0544" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-09-30T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2003-09-30T00:00:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "date": "2003-09-30T16:10:22", "db": "PACKETSTORM", "id": "31738" }, { "date": "2003-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-040" }, { "date": "2003-11-17T05:00:00", "db": "NVD", "id": "CVE-2003-0544" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-25T00:00:00", "db": "CERT/CC", "id": "VU#104280" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#732952" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#686224" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#935264" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#380864" }, { "date": "2003-10-01T00:00:00", "db": "CERT/CC", "id": "VU#255484" }, { "date": "2016-07-06T14:32:00", "db": "BID", "id": "8732" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000288" }, { "date": "2010-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200311-040" }, { "date": "2018-05-03T01:29:00", "db": "NVD", "id": "CVE-2003-0544" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200311-040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in SSL/TLS implementations", "sources": [ { "db": "CERT/CC", "id": "VU#104280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "8732" }, { "db": "CNNVD", "id": "CNNVD-200311-040" } ], "trust": 0.9 } }
cve-2009-3433
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/36816 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53426 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2009/2729 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1022937 | vdb-entry, x_refsource_SECTRACK | |
http://osvdb.org/58277 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/36486 | vdb-entry, x_refsource_BID | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36816" }, { "name": "solaris-cluster-clsetup-priv-escalation(53426)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53426" }, { "name": "ADV-2009-2729", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2729" }, { "name": "1022937", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022937" }, { "name": "58277", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58277" }, { "name": "36486", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36486" }, { "name": "267148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in clsetup in the configuration utility in Sun Solaris Cluster 3.2 allows local users to gain privileges via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36816" }, { "name": "solaris-cluster-clsetup-priv-escalation(53426)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53426" }, { "name": "ADV-2009-2729", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2729" }, { "name": "1022937", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022937" }, { "name": "58277", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58277" }, { "name": "36486", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36486" }, { "name": "267148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in clsetup in the configuration utility in Sun Solaris Cluster 3.2 allows local users to gain privileges via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36816" }, { "name": "solaris-cluster-clsetup-priv-escalation(53426)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53426" }, { "name": "ADV-2009-2729", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2729" }, { "name": "1022937", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022937" }, { "name": "58277", "refsource": "OSVDB", "url": "http://osvdb.org/58277" }, { "name": "36486", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36486" }, { "name": "267148", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3433", "datePublished": "2009-09-28T18:20:00", "dateReserved": "2009-09-28T00:00:00", "dateUpdated": "2024-08-07T06:31:10.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1601
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/17313 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015849 | vdb-entry, x_refsource_SECTRACK | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1 | vendor-advisory, x_refsource_SUNALERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25543 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/19444 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/1175 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:48.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17313" }, { "name": "1015849", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015849" }, { "name": "102278", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1" }, { "name": "suncluster-sunplex-information-disclosure(25543)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25543" }, { "name": "19444", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19444" }, { "name": "ADV-2006-1175", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1175" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in SunPlex Manager in Sun Cluster 3.1 4/04 allows local users with solaris.cluster.gui authorization to view arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17313" }, { "name": "1015849", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015849" }, { "name": "102278", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1" }, { "name": "suncluster-sunplex-information-disclosure(25543)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25543" }, { "name": "19444", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19444" }, { "name": "ADV-2006-1175", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1175" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1601", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in SunPlex Manager in Sun Cluster 3.1 4/04 allows local users with solaris.cluster.gui authorization to view arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17313", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17313" }, { "name": "1015849", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015849" }, { "name": "102278", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1" }, { "name": "suncluster-sunplex-information-disclosure(25543)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25543" }, { "name": "19444", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19444" }, { "name": "ADV-2006-1175", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1175" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1601", "datePublished": "2006-04-04T10:00:00", "dateReserved": "2006-04-03T00:00:00", "dateUpdated": "2024-08-07T17:19:48.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2267
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1530 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/35320 | vdb-entry, x_refsource_OSVDB | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.securitytracker.com/id?1018642 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id?1017953 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/23638 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/24985 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33858 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1530", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1530" }, { "name": "35320", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35320" }, { "name": "102874", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1" }, { "name": "1018642", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018642" }, { "name": "1017953", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017953" }, { "name": "23638", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23638" }, { "name": "24985", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24985" }, { "name": "cluster-sibling-node-dos(33858)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Sun Cluster 3.1 and Solaris Cluster 3.2 before 20070424 allows remote authenticated users, operating from a different cluster node, to cause a denial of service (data corruption or send_mondo panic) via unspecified vectors, as demonstrated by EMC Symcli backup software 6.2.1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1530", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1530" }, { "name": "35320", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35320" }, { "name": "102874", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1" }, { "name": "1018642", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018642" }, { "name": "1017953", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017953" }, { "name": "23638", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23638" }, { "name": "24985", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24985" }, { "name": "cluster-sibling-node-dos(33858)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33858" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Sun Cluster 3.1 and Solaris Cluster 3.2 before 20070424 allows remote authenticated users, operating from a different cluster node, to cause a denial of service (data corruption or send_mondo panic) via unspecified vectors, as demonstrated by EMC Symcli backup software 6.2.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1530", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1530" }, { "name": "35320", "refsource": "OSVDB", "url": "http://osvdb.org/35320" }, { "name": "102874", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1" }, { "name": "1018642", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018642" }, { "name": "1017953", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017953" }, { "name": "23638", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23638" }, { "name": "24985", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24985" }, { "name": "cluster-sibling-node-dos(33858)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33858" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2267", "datePublished": "2007-04-25T20:00:00", "dateReserved": "2007-04-25T00:00:00", "dateUpdated": "2024-08-07T13:33:28.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1588
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1 | vendor-advisory, x_refsource_SUNALERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/56617 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "201460", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1" }, { "name": "suncluster-haoracle-information-disclosure(56617)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56617" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Sun Cluster 2.2, when HA-Oracle or HA-Sybase DBMS services are used, stores database credentials in cleartext in a cluster configuration file, which allows local users to obtain sensitive information by reading this file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "201460", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1" }, { "name": "suncluster-haoracle-information-disclosure(56617)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56617" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sun Cluster 2.2, when HA-Oracle or HA-Sybase DBMS services are used, stores database credentials in cleartext in a cluster configuration file, which allows local users to obtain sensitive information by reading this file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "201460", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1" }, { "name": "suncluster-haoracle-information-disclosure(56617)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56617" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1588", "datePublished": "2010-02-08T20:00:00", "dateReserved": "2010-02-08T00:00:00", "dateUpdated": "2024-08-08T02:35:17.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0077
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6123 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001212 Two Holes in Sun Cluster 2.x", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "clustmon-no-authentication(6123)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001212 Two Holes in Sun Cluster 2.x", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "clustmon-no-authentication(6123)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001212 Two Holes in Sun Cluster 2.x", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "clustmon-no-authentication(6123)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0077", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:55.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0078
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/6437 | vdb-entry, x_refsource_OSVDB | |
http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6125 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6437", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6437" }, { "name": "20001212 Two Holes in Sun Cluster 2.x", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "ha-nfs-symlink(6125)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6125" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "in.mond in Sun Cluster 2.x allows local users to read arbitrary files via a symlink attack on the status file of a host running HA-NFS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6437", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6437" }, { "name": "20001212 Two Holes in Sun Cluster 2.x", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "ha-nfs-symlink(6125)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6125" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "in.mond in Sun Cluster 2.x allows local users to read arbitrary files via a symlink attack on the status file of a host running HA-NFS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6437", "refsource": "OSVDB", "url": "http://www.osvdb.org/6437" }, { "name": "20001212 Two Holes in Sun Cluster 2.x", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "name": "ha-nfs-symlink(6125)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6125" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0078", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:55.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2539
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1 | vendor-advisory, x_refsource_SUNALERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42762 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2008/1713 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1020152 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/30483 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/29458 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:05:30.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "201341", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1" }, { "name": "suncluster-unspecified-info-disclosure(42762)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42762" }, { "name": "ADV-2008-1713", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1713" }, { "name": "1020152", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020152" }, { "name": "30483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30483" }, { "name": "29458", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29458" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The Sun Cluster Global File System in Sun Cluster 3.1 on Sun Solaris 8 through 10, when an underlying ufs filesystem is used, might allow local users to read data from arbitrary deleted files, or corrupt files in global filesystems, via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "201341", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1" }, { "name": "suncluster-unspecified-info-disclosure(42762)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42762" }, { "name": "ADV-2008-1713", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1713" }, { "name": "1020152", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020152" }, { "name": "30483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30483" }, { "name": "29458", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29458" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2539", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Sun Cluster Global File System in Sun Cluster 3.1 on Sun Solaris 8 through 10, when an underlying ufs filesystem is used, might allow local users to read data from arbitrary deleted files, or corrupt files in global filesystems, via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "201341", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1" }, { "name": "suncluster-unspecified-info-disclosure(42762)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42762" }, { "name": "ADV-2008-1713", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1713" }, { "name": "1020152", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020152" }, { "name": "30483", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30483" }, { "name": "29458", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29458" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2539", "datePublished": "2008-06-03T15:00:00", "dateReserved": "2008-06-03T00:00:00", "dateUpdated": "2024-08-07T09:05:30.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1563
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1 | vendor-advisory, x_refsource_SUNALERT | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.auscert.org.au/render.html?it=3672 | third-party-advisory, x_refsource_AUSCERT | |
http://www.securityfocus.com/bid/9137 | vdb-entry, x_refsource_BID | |
http://www.auscert.org.au/render.html?it=3672 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "200810", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1" }, { "name": "101393", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1" }, { "name": "ESB-2003.0843", "tags": [ "third-party-advisory", "x_refsource_AUSCERT", "x_transferred" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "name": "9137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9137" }, { "name": "57428", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://www.auscert.org.au/render.html?it=3672" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sun Cluster 2.2 through 3.2 for Oracle Parallel Server / Real Application Clusters (OPS/RAC) allows local users to cause a denial of service (cluster node panic or abort) by launching a daemon listening on a TCP port that would otherwise be used by the Distributed Lock Manager (DLM), possibly involving this daemon responding in a manner that spoofs a cluster reconfiguration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-08-18T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "200810", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1" }, { "name": "101393", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1" }, { "name": "ESB-2003.0843", "tags": [ "third-party-advisory", "x_refsource_AUSCERT" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "name": "9137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9137" }, { "name": "57428", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://www.auscert.org.au/render.html?it=3672" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sun Cluster 2.2 through 3.2 for Oracle Parallel Server / Real Application Clusters (OPS/RAC) allows local users to cause a denial of service (cluster node panic or abort) by launching a daemon listening on a TCP port that would otherwise be used by the Distributed Lock Manager (DLM), possibly involving this daemon responding in a manner that spoofs a cluster reconfiguration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "200810", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1" }, { "name": "101393", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1" }, { "name": "ESB-2003.0843", "refsource": "AUSCERT", "url": "http://www.auscert.org.au/render.html?it=3672" }, { "name": "9137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9137" }, { "name": "57428", "refsource": "SUNALERT", "url": "http://www.auscert.org.au/render.html?it=3672" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1563", "datePublished": "2008-08-18T19:00:00Z", "dateReserved": "2008-08-18T00:00:00Z", "dateUpdated": "2024-09-16T17:28:37.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DA2DE2C-CBE9-4D76-B2DF-070EB29EB7A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "in.mond in Sun Cluster 2.x allows local users to read arbitrary files via a symlink attack on the status file of a host running HA-NFS." } ], "id": "CVE-2001-0078", "lastModified": "2024-11-20T23:34:32.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6437" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6125" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_10:*:*:*:*:*", "matchCriteriaId": "112072E9-9754-426D-A23E-DA2C1E6184B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_8:*:*:*:*:*", "matchCriteriaId": "5260CC96-1BE9-4276-A576-D2C2AB8FCA55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_9:*:*:*:*:*", "matchCriteriaId": "08504772-D91A-4842-9F79-508DCB0F210F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.2:*:solaris_10:*:*:*:*:*", "matchCriteriaId": "D22BB8AF-86E2-4791-9ACF-E088A81CF3ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.2:*:solaris_9:*:*:*:*:*", "matchCriteriaId": "0BDD15FD-58F6-4EE9-9A72-D18A6A7BCCE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Sun Cluster 3.1 and Solaris Cluster 3.2 before 20070424 allows remote authenticated users, operating from a different cluster node, to cause a denial of service (data corruption or send_mondo panic) via unspecified vectors, as demonstrated by EMC Symcli backup software 6.2.1." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Sun Cluster 3.1 y Solaris Cluster 3.2 anterior a 20070424 permite a usuarios validados, operar desde un nodo cluster de forma diferente, para provocar denegaci\u00f3n de servicio (corrupci\u00f3n de datos o send_mondo panic) a trav\u00e9s de vectores no especificados, como se demostr\u00f3 con el software de backup EMC Symcli 6.2.1." } ], "id": "CVE-2007-2267", "lastModified": "2024-11-21T00:30:21.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-25T20:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/35320" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24985" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23638" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017953" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018642" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1530" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102874-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33858" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:solaris:7:*:*:*:*:*:*:*", "matchCriteriaId": "95AE6D9D-B3DC-4DA8-916A-51BB56C32074", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:2.2:*:sparc:*:*:*:*:*", "matchCriteriaId": "E9FF8558-06EE-4FF9-BF5F-594FCD5CAA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "matchCriteriaId": "A1E585DC-FC74-4BB0-96B7-C00B6DB610DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "2EA1B48D-2AEA-492A-B425-244E23CE7CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:sparc:*:*:*:*:*", "matchCriteriaId": "42FF2057-2EC4-4710-A265-2A568A4EE277", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "matchCriteriaId": "A1E585DC-FC74-4BB0-96B7-C00B6DB610DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.2:*:sparc:*:*:*:*:*", "matchCriteriaId": "734C6539-4476-4F21-BC1B-6EFB9E78F0A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sun Cluster 2.2 through 3.2 for Oracle Parallel Server / Real Application Clusters (OPS/RAC) allows local users to cause a denial of service (cluster node panic or abort) by launching a daemon listening on a TCP port that would otherwise be used by the Distributed Lock Manager (DLM), possibly involving this daemon responding in a manner that spoofs a cluster reconfiguration." } ], "id": "CVE-2003-1563", "lastModified": "2024-11-20T23:47:26.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/9137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101393-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200810-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.auscert.org.au/render.html?it=3672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/9137" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DA2DE2C-CBE9-4D76-B2DF-070EB29EB7A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations." } ], "id": "CVE-2001-0077", "lastModified": "2024-11-20T23:34:32.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0180.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6123" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:2.2:*:sparc:*:*:*:*:*", "matchCriteriaId": "E9FF8558-06EE-4FF9-BF5F-594FCD5CAA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sun Cluster 2.2, when HA-Oracle or HA-Sybase DBMS services are used, stores database credentials in cleartext in a cluster configuration file, which allows local users to obtain sensitive information by reading this file." }, { "lang": "es", "value": "Sun Cluster v2.2, cuando se usan los servicios HA-Oracle o HA-Sybase DBMS, almacena las credenciales de la base de datos en texto plano en el archivo de configuraci\u00f3n del cluster, lo que permite a usuarios locales obtener informaci\u00f3n sensible leyendo este archivo." } ], "id": "CVE-2003-1588", "lastModified": "2024-11-20T23:47:30.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-02-08T20:30:00.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201460-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56617" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.1:4_04:*:*:*:*:*:*", "matchCriteriaId": "613E60E9-1FB4-4B1F-B110-72A66622CD76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in SunPlex Manager in Sun Cluster 3.1 4/04 allows local users with solaris.cluster.gui authorization to view arbitrary files via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en SunPlex Manager en Sun Cluster 3.1 4/04 permite a usuarios locales con autorizaci\u00f3n \u0027solaris.cluster.gui\u0027 ver ficheros de su elecci\u00f3n mediante vectores no especificados.\r\n" } ], "id": "CVE-2006-1601", "lastModified": "2024-11-21T00:09:16.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-04T10:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19444" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015849" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17313" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1175" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102278-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25543" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.2:*:solaris_10:*:*:*:*:*", "matchCriteriaId": "D22BB8AF-86E2-4791-9ACF-E088A81CF3ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.2:*:solaris_9:*:*:*:*:*", "matchCriteriaId": "0BDD15FD-58F6-4EE9-9A72-D18A6A7BCCE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in clsetup in the configuration utility in Sun Solaris Cluster 3.2 allows local users to gain privileges via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en clsetup en la utilidad de configuraci\u00f3n en Sun Solaris Cluster v3.2 permite a usuarios locales obtener privilegios mediante vectores desconocidos." } ], "id": "CVE-2009-3433", "lastModified": "2024-11-21T01:07:20.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-28T19:30:01.610", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/58277" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36816" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36486" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022937" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/2729" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/58277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267148-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/2729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53426" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_10:*:*:*:*:*", "matchCriteriaId": "112072E9-9754-426D-A23E-DA2C1E6184B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_8:*:*:*:*:*", "matchCriteriaId": "5260CC96-1BE9-4276-A576-D2C2AB8FCA55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:cluster:3.1:*:solaris_9:*:*:*:*:*", "matchCriteriaId": "08504772-D91A-4842-9F79-508DCB0F210F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sun Cluster Global File System in Sun Cluster 3.1 on Sun Solaris 8 through 10, when an underlying ufs filesystem is used, might allow local users to read data from arbitrary deleted files, or corrupt files in global filesystems, via unspecified vectors." }, { "lang": "es", "value": "El sistema de ficheros Sun Cluster Global de Sun Cluster 3.1 en Sun Solaris 8 hasta 10, cuando un sistema de ficheros subyacente ufs es utilizado, puede permitir a usuarios locales leer datos de ficheros borrados de su elecci\u00f3n, o corromper ficheros en sistemas de ficheros globales, a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2008-2539", "lastModified": "2024-11-21T00:47:06.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-03T15:32:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30483" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29458" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020152" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1713" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-201341-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42762" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }