All the vulnerabilites related to gnu - gzip
Vulnerability from fkie_nvd
Published
2022-08-31 16:15
Modified
2024-11-21 06:40
Summary
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
References
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2022-1271Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2073310Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6Broken Link
secalert@redhat.comhttps://lists.gnu.org/r/bug-gzip/2022-04/msg00011.htmlMailing List, Patch, Vendor Advisory
secalert@redhat.comhttps://security-tracker.debian.org/tracker/CVE-2022-1271Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202209-01Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20220930-0006/Third Party Advisory
secalert@redhat.comhttps://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patchPatch, Third Party Advisory
secalert@redhat.comhttps://www.openwall.com/lists/oss-security/2022/04/07/8Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2022-1271Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2073310Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6Broken Link
af854a3a-2127-422b-91ae-364da2661108https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.htmlMailing List, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/CVE-2022-1271Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202209-01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220930-0006/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patchPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2022/04/07/8Mailing List, Patch, Third Party Advisory
Impacted products
Vendor Product Version
gnu gzip *
redhat jboss_data_grid 7.0.0
debian debian_linux 10.0
tukaani xz *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE211FFB-B5CC-4827-9430-D58DA7D9EF09",
              "versionEndExcluding": "1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tukaani:xz:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B815FE77-341C-45D5-B7C5-5A828AE7764A",
              "versionEndExcluding": "5.2.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una vulnerabilidad de escritura arbitraria de archivos en la utilidad zgrep de GNU gzip. Cuando zgrep es aplicado sobre el nombre de archivo elegido por el atacante (por ejemplo, un nombre de archivo dise\u00f1ado), \u00e9ste puede sobrescribir el contenido de un archivo arbitrario seleccionado por el atacante. Este fallo es producido debido a una comprobaci\u00f3n insuficiente cuando son procesados nombres de archivo con dos o m\u00e1s l\u00edneas nuevas en los que el contenido seleccionado y los nombres de archivo de destino est\u00e1n insertados en nombres de archivo multil\u00ednea dise\u00f1ados. Este fallo permite a un atacante remoto poco privilegiado forzar a zgrep a escribir archivos arbitrarios en el sistema"
    }
  ],
  "id": "CVE-2022-1271",
  "lastModified": "2024-11-21T06:40:23.040",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-31T16:15:09.347",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-01"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-179"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-06 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.
Impacted products
Vendor Product Version
gnu gzip *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8844C001-C8AA-4D1F-A22E-0314AD0807AD",
              "versionEndIncluding": "1.3.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332."
    },
    {
      "lang": "es",
      "value": "gzexe en gzip 1.3.3 y anteriores ejecutaran un argumento cuando la creaci\u00f3n de un fichero temporal falla, en lugar de terminar el programa, lo que podr\u00eda permitir a atacantes remotos o usuarios locales ejecutar \u00f3rdenes de su elecci\u00f3n, una vulnerabilidad diferente de CVE-1999-1332."
    }
  ],
  "id": "CVE-2004-0603",
  "lastModified": "2024-11-20T23:48:57.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-06T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10603"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-07-02 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Impacted products
Vendor Product Version
gnu gzip *
debian debian_linux 2.2
debian debian_linux 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA73DA66-1271-4D42-B470-46DD4353ABD2",
              "versionEndIncluding": "1.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files."
    },
    {
      "lang": "es",
      "value": "znew en el paquete gzip permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simb\u00f3licos en ficheros temporales."
    }
  ],
  "id": "CVE-2003-0367",
  "lastModified": "2024-11-20T23:44:34.427",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-07-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-308"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:068"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/7872"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.turbolinux.com/security/TLSA-2003-38.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/7872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.turbolinux.com/security/TLSA-2003-38.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-10-04 04:00
Modified
2024-11-20 23:50
Severity ?
Summary
gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
Impacted products
Vendor Product Version
gnu gzip *
oracle solaris 8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6693B6AA-575B-4338-B9D4-B17C5FACB88C",
              "versionEndExcluding": "1.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
              "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files."
    }
  ],
  "id": "CVE-2004-1349",
  "lastModified": "2024-11-20T23:50:39.787",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12744"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1\u0026searchclause=security"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/635998"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11318"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17577"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1\u0026searchclause=security"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/635998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2005-357.html
cve@mitre.orghttp://secunia.com/advisories/18100
cve@mitre.orghttp://secunia.com/advisories/21253
cve@mitre.orghttp://secunia.com/advisories/22033
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-752
cve@mitre.orghttp://www.osvdb.org/15487
cve@mitre.orghttp://www.securityfocus.com/archive/1/394965Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/12996Patch
cve@mitre.orghttp://www.securityfocus.com/bid/19289
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3101
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2005-357.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22033
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-752
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/15487
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/394965Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12996Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19289
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3101
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
Impacted products
Vendor Product Version
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3.3
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.0
freebsd freebsd 4.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1
freebsd freebsd 4.2
freebsd freebsd 4.2
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.3
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.4
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.5
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.7
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.9
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.10
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 4.11
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.0
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
freebsd freebsd 5.2.1
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.3
freebsd freebsd 5.4
freebsd freebsd 5.4
freebsd freebsd 5.4
gentoo linux *
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 2.1
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux 4.0
redhat enterprise_linux_desktop 3.0
redhat enterprise_linux_desktop 4.0
redhat linux_advanced_workstation 2.1
redhat linux_advanced_workstation 2.1
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2
turbolinux turbolinux_appliance_server 1.0_hosting
turbolinux turbolinux_appliance_server 1.0_workgroup
turbolinux turbolinux_desktop 10.0
turbolinux turbolinux_home *
turbolinux turbolinux_server 7.0
turbolinux turbolinux_server 8.0
turbolinux turbolinux_server 10.0
turbolinux turbolinux_workstation 7.0
turbolinux turbolinux_workstation 8.0
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 4.1
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04
ubuntu ubuntu_linux 5.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A585A1-FF82-418F-90F8-072458DB7816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "E3F7EB61-55A5-4776-B0E7-3508920A6CEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
              "matchCriteriaId": "A442DE97-4485-4D95-B95D-58947585E455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "1E8A6564-129A-4555-A5ED-6F65C56AE7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
              "matchCriteriaId": "237174A4-E030-4A0B-AD0B-5C463603EAA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "5D7F8F11-1869-40E2-8478-28B4E946D3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
              "matchCriteriaId": "9062BAB5-D437-49BE-A384-39F62434B70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
              "matchCriteriaId": "3BA1504C-14FE-4C21-A801-944041F2946F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
              "matchCriteriaId": "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
              "matchCriteriaId": "6E53C673-9D6D-42C8-A502-033E1FC28D97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AC452-6042-409D-8673-ACAD108EE3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
              "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD9C12-EDAB-473F-9CC5-04F06B413720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
              "matchCriteriaId": "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
              "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
              "matchCriteriaId": "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
              "matchCriteriaId": "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "9A405AE2-ECC4-4BB0-80DD-4736394FB217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
              "matchCriteriaId": "E5612FB0-8403-4A7E-B89A-D7BDFAC00078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
              "matchCriteriaId": "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
              "matchCriteriaId": "AFDA151E-E614-4A24-A34D-B6D5309110CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "09BFA20B-2F31-4246-8F74-63DF1DB884EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
              "matchCriteriaId": "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "4AE93D3D-34B4-47B7-A784-61F4479FF5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
              "matchCriteriaId": "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
              "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
              "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
              "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
              "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
              "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
              "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
              "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
              "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
              "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
              "matchCriteriaId": "46A60ED5-1D92-4B40-956F-D1801CAB9039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
              "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
              "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
              "matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
              "matchCriteriaId": "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
              "matchCriteriaId": "409E324A-C040-494F-A026-9DCAE01C07F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
              "matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
              "matchCriteriaId": "6474B775-C893-491F-A074-802AFB1FEDD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
              "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
              "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
              "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
              "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
              "matchCriteriaId": "84A50ED3-FD0D-4038-B3E7-CC65D166C968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
              "matchCriteriaId": "777F9EC0-2919-45CA-BFF8-78A02537C513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*",
              "matchCriteriaId": "1267DA81-5D2A-4F5C-BF87-F46813E21E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*",
              "matchCriteriaId": "74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "839D2945-1417-43F5-A526-A14C491CBCEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06DCF0D-3241-453A-A0E4-937FE25EC404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B484D091-62DE-4EF2-AC54-26896CA8B315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9428589A-0BD2-469E-978D-38239117D972",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
              "matchCriteriaId": "6E94583A-5184-462E-9FC4-57B35DA06DA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "E905FAAD-37B6-4DD0-A752-2974F8336273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
              "matchCriteriaId": "3BD12488-1ED8-4751-ABF5-3578D54750A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
              "matchCriteriaId": "AE3733CF-4C88-443C-9B90-6477C9C500D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
              "matchCriteriaId": "9C500A75-D75E-45B4-B582-0F0DF27C3C04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete."
    }
  ],
  "id": "CVE-2005-0988",
  "lastModified": "2024-11-20T23:56:20.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.7,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21253"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-752"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/15487"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/394965"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12996"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19289"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3101"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/15487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/394965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12996"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-01-29 18:30
Modified
2024-11-21 01:11
Severity ?
Summary
Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
References
secalert@redhat.comhttp://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
secalert@redhat.comhttp://ncompress.sourceforge.net/#status
secalert@redhat.comhttp://savannah.gnu.org/forum/forum.php?forum_id=6153
secalert@redhat.comhttp://secunia.com/advisories/38220Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38223Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38225Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38232Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/40551
secalert@redhat.comhttp://secunia.com/advisories/40655
secalert@redhat.comhttp://secunia.com/advisories/40689
secalert@redhat.comhttp://securitytracker.com/id?1023490
secalert@redhat.comhttp://support.apple.com/kb/HT4435
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-1974
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-2074
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:019
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:020
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:152
secalert@redhat.comhttp://www.osvdb.org/61869
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0061.html
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-889-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0185Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1796
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1872
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=554418
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511
secalert@redhat.comhttps://rhn.redhat.com/errata/RHSA-2010-0095.html
af854a3a-2127-422b-91ae-364da2661108http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://ncompress.sourceforge.net/#status
af854a3a-2127-422b-91ae-364da2661108http://savannah.gnu.org/forum/forum.php?forum_id=6153
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38220Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38223Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38225Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38232Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40551
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40655
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40689
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023490
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1974
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-2074
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:019
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:020
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:152
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/61869
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0061.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-889-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0185Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1796
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1872
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=554418
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0095.html
Impacted products
Vendor Product Version
gnu gzip *
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3
gnu gzip 1.3.1
gnu gzip 1.3.2
gnu gzip 1.3.3
gnu gzip 1.3.4
gnu gzip 1.3.5
gnu gzip 1.3.6
gnu gzip 1.3.7
gnu gzip 1.3.8
gnu gzip 1.3.9
gnu gzip 1.3.10
gnu gzip 1.3.11
gnu gzip 1.3.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED29704-4CF0-4870-A76B-6109335BB9F9",
              "versionEndIncluding": "1.3.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD9CEE-AAB0-443E-A5C7-6805AFCCF6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7830E23E-C3B2-40D1-A82B-8862F82AA996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F71B1D-B822-4C4F-9009-8D8E1B9707FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B19DCC-2441-453F-8CFE-93A2FD37446C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92ACD5A-D7D3-4DBA-A7AA-BBCA2E20BA50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "614F29C6-AEB8-4274-B0F4-865DF32CCBAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D3F910-090A-43AA-8639-443DFF230958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28E3EC1-6788-459A-A4F9-0969C007131C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8563855-787C-488E-B241-1F32AD783E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD2768C-CD7E-4B2E-8919-8319D84A71DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56B3BD-EDB2-4BE1-821F-2F84548FBF9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "90855FEC-4F23-46CF-AE91-C77D6171B4D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n unlzw  en unlzw.c en gzip anterior a v1.4 sobre las plataformas de 64 bits, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo manipulado que emplea la compresi\u00f3n LZW, permitiendo a un array indexar el error."
    }
  ],
  "id": "CVE-2010-0001",
  "lastModified": "2024-11-21T01:11:18.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-01-29T18:30:00.947",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ncompress.sourceforge.net/#status"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38220"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38225"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40551"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40655"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40689"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1023490"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-2074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/61869"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1796"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1872"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ncompress.sourceforge.net/#status"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-2074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/61869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files. NOTE: the znew vulnerability may overlap CVE-2003-0367.
Impacted products
Vendor Product Version
gnu gzip 1.2.4a



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files.  NOTE: the znew vulnerability may overlap CVE-2003-0367."
    }
  ],
  "id": "CVE-2004-0970",
  "lastModified": "2024-11-20T23:49:48.170",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-02-09T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/13131"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-588"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11288"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2004/0050"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/13131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2004/0050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-11-18 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server.
Impacted products
Vendor Product Version
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD9CEE-AAB0-443E-A5C7-6805AFCCF6EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server."
    }
  ],
  "id": "CVE-2001-1228",
  "lastModified": "2024-11-20T23:37:11.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-11-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/247717"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/7882.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/3712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/247717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/7882.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/3712"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-13 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.
References
secalert@redhat.comftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtThird Party Advisory
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.ascThird Party Advisory
secalert@redhat.comhttp://bugs.gentoo.org/show_bug.cgi?id=90626Third Party Advisory
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=306172Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2005-357.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/18100Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/19183Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/22033Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/26235Third Party Advisory
secalert@redhat.comhttp://securitytracker.com/id?1013928Third Party Advisory, VDB Entry
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852Third Party Advisory
secalert@redhat.comhttp://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.htmlBroken Link, Permissions Required
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200505-05.xmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:026Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:027Third Party Advisory
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.htmlThird Party Advisory
secalert@redhat.comhttp://www.osvdb.org/16371Broken Link
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-474.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/13582Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/25159Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-158-1Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2732Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/20539Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=90626Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=306172Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2005-357.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18100Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19183Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22033Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26235Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1013928Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.htmlBroken Link, Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200505-05.xmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:026Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:027Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/16371Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-474.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/13582Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25159Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-158-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2732Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/20539Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797Third Party Advisory
Impacted products
Vendor Product Version
gnu gzip *
canonical ubuntu_linux 4.10
canonical ubuntu_linux 5.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "63ECC611-944C-43B6-A57C-443C413ECC13",
              "versionEndExcluding": "1.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script."
    }
  ],
  "id": "CVE-2005-0758",
  "lastModified": "2024-11-20T23:55:50.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-13T04:00:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://docs.info.apple.com/article.html?artnum=306172"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/19183"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26235"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1013928"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link",
        "Permissions Required"
      ],
      "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/16371"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/13582"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/25159"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-158-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2732"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://docs.info.apple.com/article.html?artnum=306172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/19183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1013928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Permissions Required"
      ],
      "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/16371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/13582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/25159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-158-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-01-29 18:30
Modified
2024-11-21 01:05
Severity ?
Summary
The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression.
References
cret@cert.orghttp://article.gmane.org/gmane.comp.gnu.gzip.bugs/258
cret@cert.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
cret@cert.orghttp://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2
cret@cert.orghttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
cret@cert.orghttp://secunia.com/advisories/38132Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/38223Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/38232Vendor Advisory
cret@cert.orghttp://support.apple.com/kb/HT4435
cret@cert.orghttp://www.debian.org/security/2010/dsa-1974
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:020
cret@cert.orghttp://www.ubuntu.com/usn/USN-889-1
cret@cert.orghttp://www.vupen.com/english/advisories/2010/0185
cret@cert.orghttps://bugzilla.redhat.com/show_bug.cgi?id=514711
af854a3a-2127-422b-91ae-364da2661108http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
af854a3a-2127-422b-91ae-364da2661108http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38132Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38223Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38232Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1974
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:020
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-889-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0185
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=514711
Impacted products
Vendor Product Version
gnu gzip *
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3
gnu gzip 1.3.1
gnu gzip 1.3.2
gnu gzip 1.3.3
gnu gzip 1.3.4
gnu gzip 1.3.5
gnu gzip 1.3.6
gnu gzip 1.3.7
gnu gzip 1.3.8
gnu gzip 1.3.9
gnu gzip 1.3.10
gnu gzip 1.3.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0782AAD8-CEA7-47E9-A8F2-175FC0B880C3",
              "versionEndIncluding": "1.3.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD9CEE-AAB0-443E-A5C7-6805AFCCF6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7830E23E-C3B2-40D1-A82B-8862F82AA996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F71B1D-B822-4C4F-9009-8D8E1B9707FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B19DCC-2441-453F-8CFE-93A2FD37446C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92ACD5A-D7D3-4DBA-A7AA-BBCA2E20BA50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "614F29C6-AEB8-4274-B0F4-865DF32CCBAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D3F910-090A-43AA-8639-443DFF230958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28E3EC1-6788-459A-A4F9-0969C007131C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8563855-787C-488E-B241-1F32AD783E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD2768C-CD7E-4B2E-8919-8319D84A71DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56B3BD-EDB2-4BE1-821F-2F84548FBF9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n huft_build en inflate.c en gzip anterior a v1.3.13 crea una tabla hufts (tambi\u00e9n conocido como huffman) demasiado peque\u00f1a, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n o buble infinito), o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo manipulado. NOTA: esta vulnerabilidad est\u00e1 provocada por una regresi\u00f3n del CVE-2006-4334."
    }
  ],
  "id": "CVE-2009-2624",
  "lastModified": "2024-11-21T01:05:19.247",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-01-29T18:30:00.793",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258"
    },
    {
      "source": "cret@cert.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"
    },
    {
      "source": "cret@cert.org",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38132"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "cret@cert.org",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "cret@cert.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of gzip as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
      "lastModified": "2010-02-02T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255Patch
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=111402732406477&w=2
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2005-357.html
cve@mitre.orghttp://secunia.com/advisories/15047Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18100
cve@mitre.orghttp://secunia.com/advisories/21253
cve@mitre.orghttp://secunia.com/advisories/22033
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-752
cve@mitre.orghttp://www.osvdb.org/15721
cve@mitre.orghttp://www.securityfocus.com/bid/19289
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3101
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/20199
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=111402732406477&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2005-357.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/15047Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21253
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22033
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-752
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/15721
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19289
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3101
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/20199
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382
Impacted products
Vendor Product Version
gnu gzip 1.2.4
gnu gzip 1.3.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file."
    }
  ],
  "id": "CVE-2005-1228",
  "lastModified": "2024-11-20T23:56:53.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21253"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-752"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/15721"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19289"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3101"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/15721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-200504-0293
Vulnerability from variot

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The gzip utility is reported prone to a security weakness; the issue occurs only when an archive is extracted into a world- or group-writeable directory. This weakness is reported to affect gzip 1.2.4, 1.3.3, and previous versions.


Want a new IT Security job?

Vacant positions at Secunia: http://secunia.com/secunia_vacancies/


TITLE: gzip Directory Traversal Vulnerability

SECUNIA ADVISORY ID: SA15047

VERIFY ADVISORY: http://secunia.com/advisories/15047/

CRITICAL: Less critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: gzip 1.x http://secunia.com/product/4220/

DESCRIPTION: Ulf H\xe4rnhammar has reported a vulnerability in gzip, which potentially can be exploited by malicious people to compromise a user's system. This makes it possible to have a file extracted to an arbitrary location outside the current directory via directory traversal attacks.

The vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3, 1.3.4 and 1.3.5. Other versions may also be affected.

SOLUTION: Do not extract untrusted ".gz" files with the "-N" flag.

PROVIDED AND/OR DISCOVERED BY: Ulf H\xe4rnhammar


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200505-05


                                        http://security.gentoo.org/

Severity: Normal Title: gzip: Multiple vulnerabilities Date: May 09, 2005 Bugs: #89946, #90626 ID: 200505-05


Synopsis

gzip contains multiple vulnerabilities potentially allowing an attacker to execute arbitrary commands. The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).

Impact

These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.

Workaround

There is no known workaround at this time.

Resolution

All gzip users should upgrade to the latest stable version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"

References

[ 1 ] CAN-2005-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758 [ 2 ] CAN-2005-0988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988 [ 3 ] CAN-2005-1228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200505-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0293",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gnu",
        "version": "1.3.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.6.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "trustix",
        "version": "2.2"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "trustix",
        "version": "2.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "5.2.1"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "appliance server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "turbolinux",
        "version": "1.0_workgroup"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "turbolinux",
        "version": "*"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "*"
      },
      {
        "model": "linux advanced workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "appliance server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "turbolinux",
        "version": "1.0_hosting"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "1.2.4a"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "trustix",
        "version": "2.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0 (x86-64)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0 (x86-64)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "10"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (ws)"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "s8500 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "s8700 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.4"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "-stablepre122300",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "linux ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "network messaging",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2.1"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0.x"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "directory pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cosmicperl",
        "version": "10.0.3"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "appliance server hosting edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "5.0.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "s8500 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.03"
      },
      {
        "model": "-release-p7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-release-p32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "enterprise linux ws ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "s8710 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "integrated management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "advanced linux environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "propack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "home",
        "scope": null,
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": "-stablepre2002-03-07",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "intuity lx",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "appliance server workgroup edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.1"
      },
      {
        "model": "advanced workstation for the itanium processor ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "-release-p8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "s8300 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "linux ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-release-p17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.4"
      },
      {
        "model": "alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "-release/alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "secure enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "integrated management",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "solaris 10.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "enterprise linux as ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cvlan",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "-release-p20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "-release-p38",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.0"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.2"
      },
      {
        "model": "-release-p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "s8710 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "gzip a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "s8700 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "-release-p5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.5"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "-stablepre050201",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "-release-p3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-release-p42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "converged communications server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "linux ia32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "1.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "6.0"
      },
      {
        "model": "enterprise linux es ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.10"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dino Dai Zovi  ddaizovi@atstake.com Tom Ferris  tommy@security-protocols.com Neil ArchibaldRob MiddletonGael DelalleauJesse Ruderman  jruderman@gmail.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0988",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 1.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 3.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2005-0988",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-0988",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-423",
            "trust": 0.6,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue \"..\" Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The gzip utility is reported prone to a security weakness; the issue occurs only when an archive is extracted into a world- or group-writeable directory. \nThis weakness is reported to affect gzip 1.2.4, 1.3.3, and previous versions. \n----------------------------------------------------------------------\n\nWant a new IT Security job?\n\nVacant positions at Secunia:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\ngzip Directory Traversal Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15047\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15047/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\ngzip 1.x\nhttp://secunia.com/product/4220/\n\nDESCRIPTION:\nUlf H\\xe4rnhammar has reported a vulnerability in gzip, which\npotentially can be exploited by malicious people to compromise a\nuser\u0027s system. This makes it\npossible to have a file extracted to an arbitrary location outside\nthe current directory via directory traversal attacks. \n\nThe vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3,\n1.3.4 and 1.3.5. Other versions may also be affected. \n\nSOLUTION:\nDo not extract untrusted \".gz\" files with the \"-N\" flag. \n\nPROVIDED AND/OR DISCOVERED BY:\nUlf H\\xe4rnhammar\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 200505-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n  Severity: Normal\n     Title: gzip: Multiple vulnerabilities\n      Date: May 09, 2005\n      Bugs: #89946, #90626\n        ID: 200505-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\ngzip contains multiple vulnerabilities potentially allowing an attacker\nto execute arbitrary commands. The zgrep utility improperly\nsanitizes arguments, which may come from an untrusted source\n(CAN-2005-0758). \n\nImpact\n======\n\nThese vulnerabilities could allow arbitrary command execution, changing\nthe permissions of arbitrary files, and installation of files to an\naribitrary location in the filesystem. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll gzip users should upgrade to the latest stable version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \"\u003e=app-arch/gzip-1.3.5-r6\"\n\nReferences\n==========\n\n  [ 1 ] CAN-2005-0758\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758\n  [ 2 ] CAN-2005-0988\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988\n  [ 3 ] CAN-2005-1228\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-200505-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-0988",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "12996",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "19289",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "18100",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "21253",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "22033",
        "trust": 1.6
      },
      {
        "db": "OSVDB",
        "id": "15487",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-3101",
        "trust": 1.6
      },
      {
        "db": "USCERT",
        "id": "TA06-214A",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "15047",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "13582",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "13290",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "20199",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229",
        "trust": 0.8
      },
      {
        "db": "SCO",
        "id": "SCOSA-2005.58",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:1169",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:765",
        "trust": 0.6
      },
      {
        "db": "SLACKWARE",
        "id": "SSA:2006-262",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20050404 GZIP TOCTOU FILE-PERMISSIONS VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA06-214A",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2005:357",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2006-08-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "101816",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-752",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "37396",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38412",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "id": "VAR-200504-0293",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4615448
  },
  "last_update_date": "2024-07-23T21:24:51.414000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "AXSA-2005-51:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=87"
      },
      {
        "title": "AXSA-2006-27:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=342"
      },
      {
        "title": "bzip2",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/bzip2.html"
      },
      {
        "title": "gzip",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/gzip.html"
      },
      {
        "title": "AXSA-2005-48:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=86"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-474.html"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-3"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2005/tlsa-2005-59.txt"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-357j.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-474j.html"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2005/tlsa-2005-59j.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/12996"
      },
      {
        "trust": 1.9,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "trust": 1.9,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
      },
      {
        "trust": 1.6,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/19289"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/archive/1/394965"
      },
      {
        "trust": 1.6,
        "url": "http://www.osvdb.org/15487"
      },
      {
        "trust": 1.6,
        "url": "http://www.debian.org/security/2005/dsa-752"
      },
      {
        "trust": 1.6,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/22033"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/21253"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/18100"
      },
      {
        "trust": 1.6,
        "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.58/scosa-2005.58.txt"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/3101"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10242"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1169"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a765"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0988"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/20199"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0988"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15047"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/13582"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/13290"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/3101"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:765"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:1169"
      },
      {
        "trust": 0.3,
        "url": "http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://www.gzip.org/"
      },
      {
        "trust": 0.3,
        "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/394965"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/395622"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/395715"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/395718"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/395909"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4220/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/15047/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "http://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0988"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.0"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-200505-05.xml"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0988"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-04-05T00:00:00",
        "db": "BID",
        "id": "12996"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "date": "2005-05-28T06:29:35",
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "date": "2005-07-02T00:59:07",
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "date": "2005-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-08-02T20:46:00",
        "db": "BID",
        "id": "12996"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      },
      {
        "date": "2007-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      },
      {
        "date": "2017-10-11T01:30:02.233000",
        "db": "NVD",
        "id": "CVE-2005-0988"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "12996"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "gzip of  gunzip Race condition vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000229"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "competitive condition",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-423"
      }
    ],
    "trust": 0.6
  }
}

var-200202-0007
Vulnerability from variot

Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code ・ If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the “Overview” for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. The resultant crash may be due to a buffer overflow condition. If this is the case, attackers may be able to exploit this vulnerability to execute arbitrary code. Multiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP request messages. Among the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. A general report for multiple vendors was initially published on February 12 (Bugtraq IDs 4088 and 4089), however more information is now available and a separate Bugtraq ID has been allocated for the Cisco Operating Systems and Appliances vulnerabilities. It is reportedly possible for a remote attacker to create a denial of service condition by transmitting a malformed SNMP request to a vulnerable Cisco Operating System or Appliance. The affected device may reset, or require a manual reset to regain functionality.

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-03: Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)

Original release date: February 12, 2002 Last revised: -- Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

Products from a very wide variety of vendors may be affected. See Vendor Information for details from vendors who have provided feedback for this advisory.

In addition to the vendors who provided feedback for this advisory, a list of vendors whom CERT/CC contacted regarding these problems is available from http://www.kb.cert.org/vuls/id/854306 http://www.kb.cert.org/vuls/id/107186

Many other systems making use of SNMP may also be vulnerable but were not specifically tested.

In addition to this advisory, we also have an FAQ available at http://www.cert.org/tech_tips/snmp_faq.html

I. Version 1 of the protocol (SNMPv1) defines several types of SNMP messages that are used to request information or configuration changes, respond to requests, enumerate SNMP objects, and send unsolicited alerts. The Oulu University Secure Programming Group (OUSPG, http://www.ee.oulu.fi/research/ouspg/) has reported numerous vulnerabilities in SNMPv1 implementations from many different vendors. More information about SNMP and OUSPG can be found in Appendix C

OUSPG's research focused on the manner in which SNMPv1 agents and managers handle request and trap messages. A trap message may indicate a warning or error condition or otherwise notify the manager about the agent's state. Request messages might be issued to obtain information from an agent or to instruct the agent to configure the host device.

Vulnerabilities in the decoding and subsequent processing of SNMP messages by both managers and agents may result in denial-of-service conditions, format string vulnerabilities, and buffer overflows. Some vulnerabilities do not require the SNMP message to use the correct SNMP community string.

These vulnerabilities have been assigned the CVE identifiers CAN-2002-0012 and CAN-2002-0013, respectively.

II.

III. Solution

Note that many of the mitigation steps recommended below may have significant impact on your everyday network operations and/or network architecture. Ensure that any changes made based on the following recommendations will not unacceptably affect your ongoing network operations capability.

Apply a patch from your vendor

Appendix A contains information provided by vendors for this advisory. Please consult this appendix to determine if you need to contact your vendor directly.

Disable the SNMP service

As a general rule, the CERT/CC recommends disabling any service or capability that is not explicitly required, including SNMP. Unfortunately, some of the affected products exhibited unexpected behavior or denial of service conditions when exposed to the OUSPG test suite even if SNMP was not enabled. In these cases, disabling SNMP should be used in conjunction with the filtering practices listed below to provide additional protection.

Ingress filtering

As a temporary measure, it may be possible to limit the scope of these vulnerabilities by blocking access to SNMP services at the network perimeter.

Ingress filtering manages the flow of traffic as it enters a network under your administrative control. Servers are typically the only machines that need to accept inbound traffic from the public Internet. In the network usage policy of many sites, there are few reasons for external hosts to initiate inbound traffic to machines that provide no public services. Thus, ingress filtering should be performed at the border to prohibit externally initiated inbound traffic to non-authorized services. For SNMP, ingress filtering of the following ports can prevent attackers outside of your network from impacting vulnerable devices in the local network that are not explicitly authorized to provide public SNMP services.

snmp 161/udp # Simple Network Management Protocol (SNMP) snmp 162/udp # SNMP system management messages

The following services are less common, but may be used on some affected products

snmp 161/tcp # Simple Network Management Protocol (SNMP) snmp 162/tcp # SNMP system management messages smux 199/tcp # SNMP Unix Multiplexer smux 199/udp # SNMP Unix Multiplexer synoptics-relay 391/tcp # SynOptics SNMP Relay Port synoptics-relay 391/udp # SynOptics SNMP Relay Port agentx 705/tcp # AgentX snmp-tcp-port 1993/tcp # cisco SNMP TCP port snmp-tcp-port 1993/udp # cisco SNMP TCP port

As noted above, you should carefully consider the impact of blocking services that you may be using.

It is important to note that in many SNMP implementations, the SNMP daemon may bind to all IP interfaces on the device. This has important consequences when considering appropriate packet filtering measures required to protect an SNMP-enabled device. For example, even if a device disallows SNMP packets directed to the IP addresses of its normal network interfaces, it may still be possible to exploit these vulnerabilities on that device through the use of packets directed at the following IP addresses: * "all-ones" broadcast address * subnet broadcast address * any internal loopback addresses (commonly used in routers for management purposes, not to be confused with the IP stack loopback address 127.0.0.1)

Careful consideration should be given to addresses of the types mentioned above by sites planning for packet filtering as part of their mitigation strategy for these vulnerabilities.

Finally, sites may wish to block access to the following RPC services related to SNMP (listed as name, program ID, alternate names)

snmp 100122 na.snmp snmp-cmc snmp-synoptics snmp-unisys snmp-utk snmpv2 100138 na.snmpv2 # SNM Version 2.2.2 snmpXdmid 100249

Please note that this workaround may not protect vulnerable devices from internal attacks.

Filter SNMP traffic from non-authorized internal hosts

In many networks, only a limited number of network management systems need to originate SNMP request messages. This can reduce, but not wholly eliminate, the risk from internal attacks. However, it may have detrimental effects on network performance due to the increased load imposed by the filtering, so careful consideration is required before implementation. Similar caveats to the previous workaround regarding broadcast and loopback addresses apply.

Change default community strings

Most SNMP-enabled products ship with default community strings of "public" for read-only access and "private" for read-write access. As with any known default access control mechanism, the CERT/CC recommends that network administrators change these community strings to something of their own choosing. However, even when community strings are changed from their defaults, they will still be passed in plaintext and are therefore subject to packet sniffing attacks. SNMPv3 offers additional capabilities to ensure authentication and privacy as described in RFC2574.

Because many of the vulnerabilities identified in this advisory occur before the community strings are evaluated, it is important to note that performing this step alone is not sufficient to mitigate the impact of these vulnerabilities. Nonetheless, it should be performed as part of good security practice.

Segregate SNMP traffic onto a separate management network

In situations where blocking or disabling SNMP is not possible, exposure to these vulnerabilities may be limited by restricting all SNMP access to separate, isolated management networks that are not publicly accessible. Although this would ideally involve physically separate networks, that kind of separation is probably not feasible in most environments. Mechanisms such as virtual LANs (VLANs) may be used to help segregate traffic on the same physical network. Note that VLANs may not strictly prevent an attacker from exploiting these vulnerabilities, but they may make it more difficult to initiate the attacks.

Another option is for sites to restrict SNMP traffic to separate virtual private networks (VPNs), which employ cryptographically strong authentication.

Note that these solutions may require extensive changes to a site's network architecture.

Egress filtering

Egress filtering manages the flow of traffic as it leaves a network under your administrative control. There is typically limited need for machines providing public services to initiate outbound traffic to the Internet. In the case of SNMP vulnerabilities, employing egress filtering on the ports listed above at your network border can prevent your network from being used as a source for attacks on other sites.

Disable stack execution

Disabling executable stacks (on systems where this is configurable) can reduce the risk of "stack smashing" attacks based on these vulnerabilities. Although this does not provide 100 percent protection against exploitation of these vulnerabilities, it makes the likelihood of a successful exploit much smaller. On many UNIX systems, executable stacks can be disabled by adding the following lines to /etc/system:

set noexec_user_stack = 1 set noexec_user_stack_log = 1

Note that this may go against the SPARC and Intel ABIs and can be bypassed as required in programs with mprotect(2). For the changes to take effect you will then need to reboot.

Other operating systems and architectures also support the disabling of executable stacks either through native configuration parameters or via third-party software. Consult your vendor(s) for additional information.

Share tools and techniques

Because dealing with these vulnerabilities to systems and networks is so complex, the CERT/CC will provide a forum where administrators can share ideas and techniques that can be used to develop proper defenses. We have created an unmoderated mailing list for system and network administrators to discuss helpful techniques and tools.

You can subscribe to the mailing list by sending an email message to majordomo@cert.org. In the body of the message, type

subscribe snmp-forum

After you receive the confirmation message, follow the instructions in the message to complete the subscription process.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this advisory. As vendors report new information to the CERT/CC, we will update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.

AdventNet

 This  is in reference to your notification regarding [VU#107186 and
 VU#854306]  and  OUSPG#0100.   AdventNet  Inc.  has reproduced this
 behavior  in  their  products and coded a Service Pack fix which is
 currently   in   regression   testing   in  AdventNet  Inc.'s  Q.A. 
 organization.    The  release  of  AdventNet  Inc's.  Service  Pack
 correcting  the  behavior  outlined in VU#617947, and OUSPG#0100 is
 scheduled  to  be  generally  available  to all of AdventNet Inc.'s
 customers by February 20, 2002.

Avaya

 Avaya  Inc.

CacheFlow

 The  purpose of this email is to advise you that CacheFlow Inc. has
 provided a software update. Please be advised that updated versions
 of  the  software  are  now  available  for all supported CacheFlow
 hardware  platforms,  and may be obtained by CacheFlow customers at
 the following URL:

      http://download.cacheflow.com/

The specific reference to the software update is contained within the Release Notes for CacheOS Versions 3.1.22 Release ID 17146, 4.0.15 Release ID 17148, 4.1.02 Release ID 17144 and 4.0.15 Release ID 17149.

RELEASE NOTES FOR CACHEFLOW SERVER ACCELERATOR PRODUCTS: * http://download.cacheflow.com/release/SA/4.0.15/relnotes.htm

RELEASE NOTES FOR CACHEFLOW CONTENT ACCELERATOR PRODUCTS: * http://download.cacheflow.com/release/CA/3.1.22/relnotes.htm * http://download.cacheflow.com/release/CA/4.0.15/relnotes.htm * http://download.cacheflow.com/release/CA/4.1.02/relnotes.htm

 * SR   1-1647517,   VI  13045:  This  update  modified  a  potential
 vulnerability by using an SNMP test tools exploit.

3Com Corporation

 A  vulnerability to an SNMP packet with an invalid length community
 string  has  been  resolved  in  the  following products. Customers
 concerned  about  this  weakness should ensure that they upgrade to
 the following agent versions:
 PS Hub 40
 2.16 is due Feb 2002
 PS Hub 50
 2.16 is due Feb 2002
 Dual Speed Hub
 2.16 is due Jan 2002
 Switch 1100/3300
 2.68 is available now
 Switch 4400
 2.02 is available now
 Switch 4900
 2.04 is available now
 WebCache1000/3000
 2.00 is due Jan 2002

Caldera

 Caldera   International,  Inc.  has  reproduced  faulty behavior in
 Caldera SCO OpenServer 5, Caldera UnixWare 7, and Caldera Open UNIX
 8.  We have coded a software fix for  supported versions of Caldera
 UnixWare  7  and  Caldera  Open UNIX 8 that will  be available from
 our   support   site  at  http://stage.caldera.com/support/security
 immediately  following the publication of this CERT announcement. A
 fix  for  supported versions of OpenServer 5 will be available at a
 later date.

Cisco Systems

 Cisco  Systems  is  addressing  the  vulnerabilities  identified by
 VU#854306  and VU#107186 across its entire product line. Cisco will
 publish    a    security   advisory   with   further   details   at
 http://www.cisco.com/go/psirt/.

Compaq Computer Corporation

 x-ref: SSRT0779U SNMP
 At  the time of writing this document, COMPAQ continues to evaluate
 this potential problem and when new versions of SNMP are available,
 COMPAQ  will implement solutions based on the new code. Compaq will
 provide  notice  of  any  new  patches  as  a result of that effort
 through  standard  patch  notification  procedures and be available
 from your normal Compaq Services support channel.

Computer Associates

 Computer  Associates  has  confirmed Unicenter vulnerability to the
 SNMP  advisory identified by CERT notification reference [VU#107186
 &   VU#854306]   and   OUSPG#0100.   We  have  produced  corrective
 maintenance  to  address  these  vulnerabilities,  which  is in the
 process  of publication for all applicable releases / platforms and
 will  be  offered  through the CA Support site.  Please contact our
 Technical    Support   organization   for   information   regarding
 availability / applicability for your specific configuration(s).

COMTEK Services, Inc.

 NMServer  for  AS/400  is  not  an SNMP master and is therefore not
 vulnerable.  However  this  product  requires the use of the AS/400
 SNMP  master  agent  supplied  by  IBM.

 NMServer   for  OpenVMS  has  been  tested  and  has  shown  to  be
 vulnerable.  COMTEK  Services  is  preparing  a new release of this
 product  (version  3.5)  which will contain a fix for this problem. 
 This  new  release  is  scheduled to be available in February 2002. 
 Contact COMTEK Services for further information.

 NMServer  for VOS has not as yet been tested; vulnerability of this
 agent  is  unknown.  Contact for further information on the testing
 schedule of the VOS product.

Covalent Technologies

 Covalent Technologies ERS (Enterprise Ready Server), Secure Server,
 and  Conductor  SNMP module are not vulnerable according to testing
 performed   in   accordance  with  CERT  recommendations.  Security
 information for Covalent products can be found at www.covalent.net

Dartware, LLC

 Dartware,  LLC  (www.dartware.com)  supplies  two products that use
 SNMPv1  in  a  manager  role,  InterMapper  and SNMP Watcher.  This statement applies to all present
 and past versions of these two software packages.

DMH Software

 DMH  Software  is  in  the  process of evaluating and attempting to
 reproduce this behavior. 
 It  is  unclear at this point if our snmp-agent is sensitive to the
 tests described above. 
 If  any  problems  will  be  discovered,  DMH  Software will code a
 software fix. 
 The  release of DMH Software OS correcting the behavior outlined in
 VU#854306, VU#107186, and OUSPG#0100 will be generally available to
 all of DMH Software's customers as soon as possible.

EnGarde Secure Linux

 EnGarde  Secure  Linux  did  not  ship any SNMP packages in version
 1.0.1 of our distribution, so we are not vulnerable to either bug.

FreeBSD

 FreeBSD  does  not  include any SNMP software by default, and so is
 not vulnerable.  However, the FreeBSD Ports Collection contains the
 UCD-SNMP   /   NET-SNMP   package.    Package   versions  prior  to
 ucd-snmp-4.2.3  are  vulnerable.   The upcoming FreeBSD 4.5 release
 will  ship  the  corrected  version  of  the  UCD-SNMP  /  NET-SNMP
 package.   In  addition,  the  corrected version of the packages is
 available from the FreeBSD mirrors.

 FreeBSD   has   issued  the  following  FreeBSD  Security  Advisory
 regarding the UCD-SNMP / NET-SNMP package:
 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:09. 
 snmp.asc.

Hewlett-Packard Company

 SUMMARY - known vulnerable:
 ========================================
 hp procurve switch 2524
 NNM  (Network Node Manager)
 JetDirect Firmware (Older versions only)
 HP-UX Systems running snmpd or OPENVIEW
 MC/ServiceGuard
 EMS
 Still under investigation:
 SNMP/iX (MPE/iX)
 ========================================
 _________________________________________________________
 ---------------------------------------------------------
 hp procurve switch 2524 
 ---------------------------------------------------------
 hp procurve switch 2525 (product J4813A) is vulnerable to some
 issues, patches in process. Watch for the associated HP
 Security Bulletin. 
 ---------------------------------------------------------
 NNM  (Network Node Manager)
 ---------------------------------------------------------
 Some problems were found in NNM product were related to
 trap handling. Patches in process. Watch for the
 associated HP Security Bulletin. 
 ---------------------------------------------------------
 JetDirect Firmware (Older versions only)
 ---------------------------------------------------------
 ONLY some older versions of JetDirect Firmware are
 vulnerable to some of the issues.  The older firmware
 can be upgraded in most cases, see list below. 
 JetDirect Firmware Version    State
 ==========================    =====
    X.08.32 and higher     NOT Vulnerable
    X.21.00 and higher     NOT Vulnerable
 JetDirect Product Numbers that can be freely
 upgraded to X.08.32 or X.21.00 or higher firmware. 
 EIO (Peripherals Laserjet 4000, 5000, 8000, etc...)
 J3110A 10T
 J3111A 10T/10B2/LocalTalk
 J3112A Token Ring (discontinued)
 J3113A 10/100 (discontinued)
 J4169A 10/100
 J4167A Token Ring
 MIO (Peripherals LaserJet 4, 4si, 5si, etc...)
 J2550A/B 10T (discontinued)
 J2552A/B 10T/10Base2/LocalTalk (discontinued)
 J2555A/B Token Ring (discontinued)
 J4100A 10/100
 J4105A Token Ring
 J4106A 10T
 External Print Servers
 J2591A EX+ (discontinued)
 J2593A EX+3 10T/10B2 (discontinued)
 J2594A EX+3 Token Ring (discontinued)
 J3263A 300X 10/100
 J3264A 500X Token Ring
 J3265A 500X 10/100
 ----------------------------------------------------------
 HP-UX Systems running snmpd or OPENVIEW
 ----------------------------------------------------------
 The following patches are available now:
   PHSS_26137 s700_800 10.20 OV EMANATE14.2 Agent Consolidated Patch
   PHSS_26138 s700_800 11.X  OV EMANATE14.2 Agent Consolidated Patch
   PSOV_03087 EMANATE Release 14.2 Solaris 2.X  Agent Consolidated
 Patch
 All three patches are available from:
 http://support.openview.hp.com/cpe/patches/
 In addition PHSS_26137 and PHSS_26138 will soon be available from:
 http://itrc.hp.com
 ================================================================
 NOTE: The patches are labeled OV(Open View). However, the patches
 are also applicable to systems that are not running Open View. 
 =================================================================
 Any   HP-UX  10.X  or  11.X  system  running  snmpd  or  snmpdm  is
 vulnerable. 
 To determine if your HP-UX system has snmpd or snmpdm installed:
   swlist -l file | grep snmpd
 If a patch is not available for your platform or you cannot install
 an  available  patch,  snmpd and snmpdm can be disabled by removing
 their
 entries  from  /etc/services  and  removing the execute permissions
 from
 /usr/sbin/snmpd and /usr/sbin/snmpdm. 
 ----------------------------------------------------------------
 Investigation completed, systems vulnerable. 
 ----------------------------------------------------------------
 MC/ServiceGuard
 Event Monitoring System  (EMS)
 ----------------------------------------------------------------
   Still under investigation:
 ----------------------------------------------------------------
 SNMP/iX (MPE/iX)

Hirschmann Electronics GmbH & Co. KG

 Hirschmann  Electronics  GmbH  &  Co.  KG supplies a broad range of
 networking  products,  some  of  which  are  affected  by  the SNMP
 vulnerabilities  identified by CERT Coordination Center. Hirschmann customers may contact our Competence
 Center (phone +49-7127-14-1538, email:
 ans-support@nt.hirschmann.de)     for    additional    information,
 especially  regarding  availability  of  latest  firmware  releases
 addressing the SNMP vulnerabilities.

IBM Corporation

 Based  upon  the  results  of  running  the  test  suites  we  have
 determined  that  our  version  of  SNMP  shipped  with  AIX is NOT
 vulnerable.

Innerdive Solutions, LLC

 Innerdive Solutions, LLC has two SNMP based products:
 1. The "SNMP MIB Scout"
 (http://www.innerdive.com/products/mibscout/)
 2. The "Router IP Console" (http://www.innerdive.com/products/ric/)
 The "SNMP MIB Scout" is not vulnerable to either bug. 
 The "Router IP Console" releases prior to 3.3.0.407 are vulnerable. 
 The release of "Router IP Console" correcting the behavior outlined
 in  OUSPG#0100  is  3.3.0.407 and is already available on our site. 
 Also,  we  will  notify all our customers about this new release no
 later than March 5, 2002.

Juniper Networks

 This  is  in reference to your notification regarding CAN-2002-0012
 and  CAN-2002-0013.   Juniper Networks has reproduced this behavior
 and coded a software fix.  The fix will be included in all releases
 of  JUNOS Internet software built after January 5, 2002.  Customers
 with  current  support contracts can download new software with the
 fix from Juniper's web site at www.juniper.net. 
 Note: The behavior described in CAN-2002-0012 and CAN-2002-0013 can
 only  be  reproduced  in JUNOS Internet software if certain tracing
 options  are  enabled.   These options are generally not enabled in
 production routers.

Lantronix, Inc.

 Lantronix  is  committed  to  resolving  security  issues  with our
 products.  The SNMP security bug you reported has been fixed in LRS
 firmware version B1.3/611(020123).

Lotus Development Corporation

 Lotus    Software   evaluated   the   Lotus   Domino   Server   for
 vulnerabilities using the test suite materials provided by OUSPG. 
 This  problem  does  not affect default installations of the Domino
 Server.   However,  SNMP  agents  can  be  installed from the CD to
 provide  SNMP  services for the Domino Server (these are located in
 the   /apps/sysmgmt/agents   directory).    The  optional  platform
 specific  master  and  encapsulator  agents included with the Lotus
 Domino  SNMP  Agents  for  HP-UX  and Solaris have been found to be
 vulnerable.  For  those  platforms,  customers  should  upgrade  to
 version  R5.0.1  a  of  the Lotus Domino SNMP Agents, available for
 download  from the Lotus Knowledge Base on the IBM Support Web Site
 (http://www.ibm.com/software/lotus/support/).   Please   refer   to
 Document  #191059,  "Lotus Domino SNMP Agents R5.0.1a", also in the
 Lotus Knowledge Base, for more details.

LOGEC Systems Inc

 The  products  from  LOGEC  Systems are exposed to SNMP only via HP
 OpenView.  We  do  not have an implementation of SNMP ourselves. As
 such,  there is nothing in our products that would be an issue with
 this alert.

Lucent

 Lucent is aware of reports that there is a vulnerability in certain
 implementations  of  the  SNMP (Simple Network Management Protocol)
 code  that  is  used in data switches and other hardware throughout
 the telecom industry. 
 As soon as we were notified by CERT, we began assessing our product
 portfolio  and  notifying  customers  with  products  that might be
 affected. 
 Our  5ESS  switch  and  most  of  our  optical  portfolio  were not
 affected.   Our  core  and  edge  ATM switches and most of our edge
 access  products  are  affected, but we have developed, tested, and
 deployed  fixes for many of those products to our customers. 
 We consider the security and reliability of our customers' networks
 to  be  one  of  our  critical  measures  of success. We take every
 reasonable measure to ensure their satisfaction. 
 In  addition,  we  are  working  with  customers on ways to further
 enhance the security they have in place today.

Marconi

 Marconi  supplies  a  broad range of telecommunications and related
 products,  some  of  which are affected by the SNMP vulnerabilities
 identified  here. Those
 Marconi   customers   with  support  entitlement  may  contact  the
 appropriate   Technical  Assistance  Center  (TAC)  for  additional
 information.  Those not under support entitlement may contact their
 sales representative.

Microsoft Corporation

 The  Microsoft  Security Reponse [sic] Center has investigated this
 issue, and provides the following information.  The  SNMP v1 service is not installed or running by
 default on any version of Windows. A patch is underway to eliminate
 the  vulnerability.  In  the  meantime,  we recommend that affected
 customers disable the SNMP v1 service.

 Details:
 An  SNMP  v1 service ships on the CDs for Windows 95, 98, and 98SE. 
 It  is  not  installed  or  running  by  default  on  any  of these
 platforms.  An SNMP v1 is NOT provided for Windows ME.  However, it
 is  possible  that  Windows  98  machines  which  had  the  service
 installed  and  were  upgraded would still have the service.  Since
 SNMP  is  not  supported for WinME, customers in this situation are
 urged to remove the SNMP service. 
 An  SNMP  v1  service  is  available  on  Windows NT 4.0 (including
 Terminal  Server  Edition) and Windows 2000 but is not installed or
 running  by  default  on any of these platforms.Windows XP does not
 ship with an SNMP v1 service.

 Remediation:
 A  patch  is  underway  for  the  affected  platforms,  and will be
 released  shortly.  In  the  meantime,  Microsoft  recommends  that
 customers  who  have  the  SNMP  v1  service  running disable it to
 protect their systems. Following are instruction for doing this:

 Windows 95, 98 and 98SE:
 1. In Control Panel, double-click Network. 
 2. On  the  Configuration  tab,  select Microsoft SNMP Agent from the
    list of installed components. 
 3. Click Remove

 Check the following keys and confirm that snmp.exe is not listed. 
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunSer
 vices
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

 For Windows XP:
 1. Right-click on My Computer and select Manage
 2. Click on Services and Applications, then on Services
 3. Location  SNMP  on  the list of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click  OK  to  close  the  dialoge  [sic], then close the Computer
    Management window.

 For Windows NT 4.0 (including Terminal Server Edition):
 1. Select Start, then Settings. 
 2. Select Control Panel, then click on the Services Icon
 3. Locate  SNMP  on  the  list  of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click OK to close the dialoge [sic], then close Control Panel

 Windows 2000:
 1. Right-click on My Computer and select Manage
 2. Click on Services and Applications, then on Services
 3. Location  SNMP  on  the list of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click  OK  to  close  the  dialoge  [sic], then close the Computer
    Management window.

Multinet

 MultiNet  and  TCPware customers should contact Process Software to
 check  for  the availability of patches for this issue. A couple of
 minor  problems were found and fixed, but there is no security risk
 related to the SNMP code included with either product.

Netaphor

 NETAPHOR  SOFTWARE INC. is the creator of Cyberons for Java -- SNMP
 Manager  Toolkit  and Cyberons for Java -- NMS Application Toolkit,
 two   Java  based  products  that  may  be  affected  by  the  SNMP
 vulnerabilities  identified  here.  The  manner  in  which they are
 affected  and the actions required (if any) to avoid being impacted
 by  exploitation  of  these  vulnerabilities,  may  be  obtained by
 contacting  Netaphor  via email at info@netaphor.com Customers with
 annual support may contact support@netaphor.com directly. Those not
 under    support    entitlement   may   contact   Netaphor   sales:
 sales@netaphor.com or (949) 470 7955 in USA.

NetBSD

 NetBSD does not ship with any SNMP tools in our 'base' releases. We
 do  provide  optional  packages  which  provide various support for
 SNMP.  These  packages  are  not installed by default, nor are they
 currently  provided  as  an  install option by the operating system
 installation tools. A system administrator/end-user has to manually
 install this with our package management tools. These SNMP packages
 include:
      + netsaint-plugin-snmp-1.2.8.4  (SNMP  monitoring  plug-in  for
        netsaint)
      + p5-Net-SNMP-3.60 (perl5 module for SNMP queries)
      + p5-SNMP-3.1.0  (Perl5  module for interfacing to the UCD SNMP
        library
      + p5-SNMP_Session-0.83   (perl5  module  providing  rudimentary
        access to remote SNMP agents)
      + ucd-snmp-4.2.1  (Extensible  SNMP  implementation) (conflicts
        with ucd-snmp-4.1.2)
      + ucd-snmp-4.1.2  (Extensible  SNMP  implementation) (conflicts
        with ucd-snmp-4.2.1)

 We    do   provide   a   software   monitoring   mechanism   called
 'audit-packages',  which allows us to highlight if a package with a
 range  of  versions  has  a potential vulnerability, and recommends
 that the end-user upgrade the packages in question.

Netscape Communications Corporation

 Netscape  continues  to be committed to maintaining a high level of
 quality  in  our  software  and  service  offerings.  Part  of this
 commitment  includes  prompt response to security issues discovered
 by organizations such as the CERT Coordination Center. 
 According  to a recent CERT/CC advisory, The Oulu University Secure
 Programming  Group (OUSPG) has reported numerous vulnerabilities in
 multiple  vendor  SNMPv1 implementations. 
 We  have  carefully  examined the reported findings, performing the
 tests  suggested  by the OUSPG to determine whether Netscape server
 products  were  subject to these vulnerabilities. It was determined
 that several products fell into this category. As a result, we have
 created  fixes  which will resolve the issues, and these fixes will
 appear  in  future  releases  of  our  product  line. To Netscape's
 knowledge,  there  are  no known instances of these vulnerabilities
 being exploited and no customers have been affected to date. 
 When such security warnings are issued, Netscape has committed to -
 and will continue to commit to - resolving these issues in a prompt
 and timely fashion, ensuring that our customers receive products of
 the highest quality and security.

NET-SNMP

 All  ucd-snmp  version  prior  to  4.2.2  are  susceptible  to this
 vulnerability  and  users  of  versions  prior to version 4.2.2 are
 encouraged   to   upgrade   their  software  as  soon  as  possible
 (http://www.net-snmp.org/download/).  Version  4.2.2 and higher are
 not susceptible.

Network Associates

 PGP is not affected, impacted, or otherwise related to this VU#.

Network Computing Technologies

 Network   Computing   Technologies  has  reviewed  the  information
 regarding  SNMP  vulnerabilities and is currently investigating the
 impact to our products.

Nokia

 This  vulnerability  is  known  to affect IPSO versions 3.1.3, 3.3,
 3.3.1,  3.4,  and  3.4.1.   Patches  are  currently  available  for
 versions  3.3,  3.3.1,  3.4  and  3.4.1 for download from the Nokia
 website.   In  addition,  version  3.4.2  shipped  with  the  patch
 incorporated,  and the necessary fix will be included in all future
 releases of IPSO. 
 We  recommend customers install the patch immediately or follow the
 recommended precautions below to avoid any potential exploit. 
 If you are not using SNMP services, including Traps, simply disable
 the   SNMP   daemon   to   completely   eliminate   the   potential
 vulnerability. 
 If   you  are  using  only  SNMP  Traps  and  running  Check  Point
 FireWall-1,  create  a  firewall  policy  to disallow incoming SNMP
 messages on all appropriate interfaces. Traps will continue to work
 normally.

Nortel Networks

 The  CERT Coordination Center has issued a broad based alert to the
 technology industry, including Nortel Networks, regarding potential
 security   vulnerabilities   identified   in   the  Simple  Network
 Management  Protocol  (SNMP),  a  common  networking  standard. The
 company   is   working   with  CERT  and  other  network  equipment
 manufacturers, the U.S. Government, service providers, and software
 suppliers to assess and address this issue.

Novell

 Novell ships SNMP.NLM and SNMPLOG.NLM with NetWare 4.x, NetWare 5.x
 and  6.0  systems. The SNMP and SNMPLOG vulnerabilities detected on
 NetWare  are  fixed and will be available through NetWare 6 Support
 Pack 1 & NetWare 5.1 Support Pack 4. Support packs are available at
 http://support.novell.com/tools/csp/

OpenBSD

 OpenBSD does not ship SNMP code.

Qualcomm

 WorldMail  does  not  support SNMP by default, so customers who run
 unmodified installations are not vulnerable.

Redback Networks, Inc.

 Redback  Networks,  Inc.  has  identified that the vulnerability in
 question  affects  certain versions of AOS software on the SMS 500,
 SMS  1800,  and  SMS 10000 platforms, and is taking the appropriate
 steps necessary to correct the issue.

Red Hat

 RedHat has released a security advisiory [sic] at
 http://www.redhat.com/support/errata/RHSA-2001-163.html
 with  updated  versions  of  the ucd-snmp package for all supported
 releases and architectures. For more information or to download the
 update please visit this page.

SGI

 SGI  acknowledges  the SNMP vulnerabilities reported by CERT and is
 currently  investigating. 
 For  the  protection  of  all our customers, SGI does not disclose,
 discuss  or  confirm vulnerabilities until a full investigation has
 occurred  and  any  necessary  patch(es)  or  release  streams  are
 available  for all vulnerable and supported IRIX operating systems. 
 Until SGI has more definitive information to provide, customers are
 encouraged  to  assume  all security vulnerabilities as exploitable
 and  take  appropriate  steps  according  to  local  site  security
 policies   and   requirements.   As   further  information  becomes
 available,  additional advisories will be issued via the normal SGI
 security  information  distribution  methods  including the wiretap
 mailing list on http://www.sgi.com/support/security/.

SNMP Research International

 SNMP  Research  has  made  the following vendor statement. They are
 likely  to  revise  and  expand  the  statement as the date for the
 public vulnerability announcement draws nearer.   Users  maintaining
 earlier  releases should update to the current release if they have
 not  already  done  so. Other Stonesoft's products are
 still   under   investigation.

 Sun's  SNMP  product,  Solstice  Enterprise Agents (SEA), described
 here:
 http://www.sun.com/solstice/products/ent.agents/
 is  affected  by VU#854306 but not VU#107186. More specifically the
 main  agent  of  SEA, snmpdx(1M), is affected on Solaris 2.6, 7, 8. 
 Sun  is  currently  generating  patches  for this issue and will be
 releasing  a  Sun Security Bulletin once the patches are available. 
 The bulletin will be available from:
 http://sunsolve.sun.com/security.  Sun  patches are available from:
 http://sunsolve.sun.com/securitypatch.

Symantec Corporation

 Symantec Corporation has investigated the SNMP issues identified by
 the  OUSPG test suite and determined that Symantec products are not
 susceptable [sic] to these issues.

TANDBERG

 Tandberg  have  run  all  the  testcases found the PROTOS test-suie
 [sic], c06snmpv1:
 1. c06-snmpv1-trap-enc-pr1.jar
 2. c06-snmpv1-treq-app-pr1.jar
 3. c06-snmpv1-trap-enc-pr1.jar
 4. c06-snmpv1-req-app-pr1.jar
 The  tests  were  run with standard delay time between the requests
 (100ms),  but  also  with  a delay of 1ms. The tests applies to all
 TANDBERG  products (T500, T880, T1000, T2500, T6000 and T8000). The
 software  tested  on these products were B4.0 (our latest software)
 and no problems were found when running the test suite.

Appendix B. - References 1. http://www.ee.oulu.fi/research/ouspg/protos/ 2. http://www.kb.cert.org/vuls/id/854306 3. http://www.kb.cert.org/vuls/id/107186 4. http://www.cert.org/tech_tips/denial_of_service.html 5. http://www.ietf.org/rfc/rfc1067.txt 6. http://www.ietf.org/rfc/rfc1089.txt 7. http://www.ietf.org/rfc/rfc1140.txt 8. http://www.ietf.org/rfc/rfc1155.txt 9. http://www.ietf.org/rfc/rfc1156.txt 10. http://www.ietf.org/rfc/rfc1215.txt 11. http://www.ietf.org/rfc/rfc1270.txt 12. http://www.ietf.org/rfc/rfc1352.txt

Appendix C. - Background Information

 Background Information on the OUSPG

   OUSPG  is an academic research group located at Oulu University in
   Finland.  The  purpose  of this research group is to test software
   for vulnerabilities. 
   History  has  shown  that  the  techniques  used by the OUSPG have
   discovered a large number of previously undetected problems in the
   products  and  protocols  they  have  tested.  In  2001, the OUSPG
   produced a comprehensive test suite for evaluating implementations
   of  the  Lightweight  Directory  Access Protocol (LDAP). This test
   suite  was  developed with the strategy of abusing the protocol in
   unsupported  and  unexpected  ways,  and  it was very effective in
   uncovering  a  wide  variety  of  vulnerabilities  across  several
   products.  This approach can reveal vulnerabilities that would not
   manifest themselves under normal conditions. 
   After  completing  its  work  on  LDAP,  OUSPG  moved its focus to
   SNMPv1.  As  with  LDAP,  they designed a custom test suite, began
   testing   a   selection   of  products,  and  found  a  number  of
   vulnerabilities.  Because  OUSPG's  work  on  LDAP  was similar in
   procedure  to its current work on SNMP, you may wish to review the
   LDAP  Test  Suite  and  CERT  Advisory  CA-2001-18, which outlined
   results of application of the test suite. 
   In order to test the security of protocols like SNMPv1, the PROTOS
   project  presents  a  server with a wide variety of sample packets
   containing  unexpected  values  or  illegally formatted data. As a
   member of the PROTOS project consortium, the OUSPG used the PROTOS
   c06-snmpv1  test  suite  to  study  several implementations of the
   SNMPv1  protocol. Software and
   firmware products designed for networks often make use of the SNMP
   protocol.  SNMP  runs  on  a  multitude  of  devices and operating
   systems, including, but not limited to,
      + Core  Network  Devices (Routers, Switches, Hubs, Bridges, and
        Wireless Network Access Points)
      + Operating Systems
      + Consumer  Broadband  Network  Devices  (Cable  Modems and DSL
        Modems)
      + Consumer Electronic Devices (Cameras and Image Scanners)
      + Networked   Office  Equipment  (Printers,  Copiers,  and  FAX
        Machines)
      + Network and Systems Management/Diagnostic Frameworks (Network
        Sniffers and Network Analyzers)
      + Uninterruptible Power Supplies (UPS)
      + Networked Medical Equipment (Imaging Units and Oscilloscopes)
      + Manufacturing and Processing Equipment
   The  SNMP  protocol  is  formally defined in RFC1157. Quoting from
   that RFC:

            Implicit  in the SNMP architectural model is a collection
            of  network  management  stations  and  network elements. 
            Network    management    stations    execute   management
            applications  which monitor and control network elements. 
            Network  elements  are  devices  such as hosts, gateways,
            terminal  servers,  and  the  like, which have management
            agents  responsible for performing the network management
            functions  requested  by the network management stations.

   Additionally,   SNMP  is  discussed  in  a  number  of  other  RFC
   documents:
      + RFC 3000 Internet Official Protocol Standards
      + RFC 1212 Concise MIB Definitions
      + RFC  1213  Management Information Base for Network Management
        of TCP/IP-based Internets: MIB-II
      + RFC  1215  A  Convention  for Defining Traps for use with the
        SNMP
      + RFC 1270 SNMP Communications Services
      + RFC  2570  Introduction to Version 3 of the Internet-standard
        Network Management Framework
      + RFC  2571  An  Architecture  for  Describing  SNMP Management
        Frameworks
      + RFC  2572  Message  Processing and Dispatching for the Simple
        Network Management Protocol (SNMP)
      + RFC 2573 SNMP Applications
      + RFC 2574 User-based Security Model (USM) for version 3 of the
        Simple Network Management Protocol (SNMPv3)
      + RFC  2575  View-based  Access  Control  Model  (VACM) for the
        Simple Network Management Protocol (SNMP)
      + RFC  2576  Coexistence  between  Version  1,  Version  2, and
        Version   3   of  the  Internet-standard  Network  Management
        Framework
     _____________________________________________________________

   The  CERT  Coordination  Center  thanks the Oulu University Secure
   Programming  Group  for reporting these vulnerabilities to us, for
   providing  detailed  technical  analyses,  and for assisting us in
   preparing  this  advisory.  We also thank Steven M. Bellovin (AT&T
   Labs  --  Research),  Wes Hardaker (Net-SNMP), Steve Moulton (SNMP
   Research),  Tom Reddington (Bell Labs), Mike Duckett (Bell South),
   Rob   Thomas,  Blue  Boar  (Thievco),  and  the  many  others  who
   contributed to this document. 
     _____________________________________________________________

   Feedback  on  this document can be directed to the authors, Ian A. 
   Finlay, Shawn V. Hernan, Jason A. Rafail, Chad Dougherty, Allen D. 
   Householder, Marty Lindner, and Art Manion. 
   __________________________________________________________________

   This document is available from:
   http://www.cert.org/advisories/CA-2002-03.html
   __________________________________________________________________

   CERT/CC Contact Information

    Email: cert@cert.org
            Phone: +1 412-268-7090 (24-hour hotline)
            Fax: +1 412-268-6989
            Postal address:
            CERT Coordination Center
            Software Engineering Institute
            Carnegie Mellon University
            Pittsburgh PA 15213-3890
            U.S.A.

   CERT/CC  personnel  answer  the  hotline  08:00-17:00 EST(GMT-5) /
   EDT(GMT-4) Monday through Friday; they are on call for emergencies
   during other hours, on U.S. holidays, and on weekends.

   Using encryption
   We  strongly  urge  you  to  encrypt sensitive information sent by
   email. Our public PGP key is available from
    http://www.cert.org/CERT_PGP.key
   If  you  prefer  to use DES, please call the CERT hotline for more
   information.

   Getting  security information
   CERT publications and other security information are available
   from our web site
    http://www.cert.org/
   To   subscribe  to  the  CERT  mailing  list  for  advisories  and
   bulletins, send email to majordomo@cert.org. Please include in the
   body of your message

     subscribe cert-advisory

   * "CERT" and "CERT Coordination Center" are registered in the U.S. 
   Patent and Trademark Office. 
   __________________________________________________________________

   NO WARRANTY
   Any  material  furnished  by  Carnegie  Mellon  University and the
   Software  Engineering  Institute is furnished on an "as is" basis. 
   Carnegie Mellon University makes no warranties of any kind, either
   expressed  or  implied as to any matter including, but not limited
   to,   warranty   of   fitness   for   a   particular   purpose  or
   merchantability,  exclusivity  or results obtained from use of the
   material. Carnegie Mellon University does not make any warranty of
   any  kind  with  respect  to  freedom  from  patent, trademark, or
   copyright infringement. 
     _____________________________________________________________

   Conditions for use, disclaimers, and sponsorship information
   Copyright 2002 Carnegie Mellon University.

Revision History

   February 12, 2002: Initial release

-----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8

iQCVAwUBPGltxKCVPMXQI2HJAQGVeAQAuHtxGBsmU5HI6PtqhpZ1rkpV+Cq3ChIU R1FUz4Zi2vzklH8jdXd10KqwZAPhXTPazeguhRyLVSUprMlSKqcXg3BCkH/y4WAl QUZ1VnQXMnMrxIJO1fv0WW0pcyM4W0iQBl0kCIlawPcjCGVniOCOr+4CE0f923wr uZiMJ5f2SEo= =h42e -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200202-0007",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios 12.0",
        "scope": "ne",
        "trust": 5.4,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1",
        "scope": "ne",
        "trust": 3.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "3com",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "american power conversion",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "aprisma",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "bea",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "bmc",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cnt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "comtek services",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cscare",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cacheflow",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "carrier access",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "compaq computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "computer associates",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "concord",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "dart",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "digital",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "entrada",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "equinox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "f5",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "fluke",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "general datacomm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hirschmann",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "iplanet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "itouch",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "infovista",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "inktomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "innerdive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "ipswitch",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "karlnet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lantronix",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "larscom incorporated",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lotus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mg soft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mandriva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "marconi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mercury interactive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "metrobility optical",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "micromuse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "monfox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "multinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "net snmp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "network harmoni",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nbase xyplex",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netscout",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netsilicon",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netscape",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "network appliance",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "novell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "openwave",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "optical access",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "perle",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "powerware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "radware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "redback",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "riverstone",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "snmp research",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sniffer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sonus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "stonesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "the sco group sco unix",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "tivoli",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "toshiba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "unisphere",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "vertical",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "vina",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "world wide packets",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "xerox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "e security",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "net com",
        "version": null
      },
      {
        "model": "ios 12.2",
        "scope": "ne",
        "trust": 1.5,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "cisco",
        "version": "30002.5.2"
      },
      {
        "model": "ios 12.0 xe",
        "scope": null,
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 dc2",
        "scope": "ne",
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "snmp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snmp",
        "version": "*"
      },
      {
        "model": "windows 98se",
        "scope": null,
        "trust": 0.9,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "microsoft",
        "version": "95"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "ios 12.0 s6",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nudesign team",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "outback resource group",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "veritas",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "bintec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "interniche",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ncipher corp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netscreen",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nokia",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.24"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "windows 2000",
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows 9x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "95"
      },
      {
        "model": "windows 9x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "98"
      },
      {
        "model": "windows 9x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "98 scd"
      },
      {
        "model": "windows 9x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "me"
      },
      {
        "model": "windows nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "4.0 (server)"
      },
      {
        "model": "windows nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "4.0 (terminal_srv)"
      },
      {
        "model": "windows nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "4.0 (workstation)"
      },
      {
        "model": "windows xp",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "sp3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "6.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "windows xp gold",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "0"
      },
      {
        "model": "windows nt",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "4.0.1"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "3.0.1"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "2.1"
      },
      {
        "model": "ios 12.0 s7",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 bx",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e8",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s8",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 w5",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 xe?",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "30003.1"
      },
      {
        "model": "ios 12.0 s1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 wc1",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xu",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 db1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st2",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e3",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 db2",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "30003.0.3"
      },
      {
        "model": "ios 12.1 ex",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "snmp",
        "scope": null,
        "trust": 0.6,
        "vendor": "snmp",
        "version": null
      },
      {
        "model": "sunnet manager sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.3"
      },
      {
        "model": "sunnet manager intel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.3"
      },
      {
        "model": "sunmc rr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "sunmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "sunmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.1.1"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.5"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.4"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.3"
      },
      {
        "model": "research mid-level manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "research enterpol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "research dr-web manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "emulex 1gbit fibrechannel hub",
        "scope": null,
        "trust": 0.3,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": "brocade",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "2.6.0"
      },
      {
        "model": "networks aos",
        "scope": null,
        "trust": 0.3,
        "vendor": "redback",
        "version": null
      },
      {
        "model": "realplayer intranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "5.0"
      },
      {
        "model": "software tcpware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "process",
        "version": "5.5"
      },
      {
        "model": "software multinet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "process",
        "version": "4.4"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.0.1"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.2"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.1"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.0"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.5"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.0"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "5.1"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "5.0"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.11"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.2"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.0"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4.1"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.3.1"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.3"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.1.3"
      },
      {
        "model": "ucd-snmp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.2.1"
      },
      {
        "model": "ucd-snmp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.1.1"
      },
      {
        "model": "windows xp professional",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows xp home",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows nt workstation sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "98"
      },
      {
        "model": "windows terminal services sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows terminal services sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows terminal services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "domino snmp agents solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1x86"
      },
      {
        "model": "domino snmp agents solaris sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1"
      },
      {
        "model": "domino snmp agents hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1"
      },
      {
        "model": "lrs",
        "scope": null,
        "trust": 0.3,
        "vendor": "lantronix",
        "version": null
      },
      {
        "model": "junos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.1"
      },
      {
        "model": "junos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.0"
      },
      {
        "model": "solutions router ip console",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "innerdive",
        "version": "3.3.0.406"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "secure os software for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "1.0"
      },
      {
        "model": "procurve switch 8000m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4108gl-bundle",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4108gl",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4000m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2525"
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2524"
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2512"
      },
      {
        "model": "procurve switch 2424m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 2400m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 1600m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ov/sam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "3.0.1"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.10"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.2"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.211.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.210.x"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.2"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.1"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.111.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.110.x"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "openview network node manager nt 4.x/windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.02000"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.011.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.010.20"
      },
      {
        "model": "openview network node manager windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.0.23.51/4.0"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.11"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.11"
      },
      {
        "model": "openview extensible snmp agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.0"
      },
      {
        "model": "openview emanate snmp agent solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.22.x"
      },
      {
        "model": "openview emanate snmp agent hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.211.x"
      },
      {
        "model": "openview emanate snmp agent hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.210.20"
      },
      {
        "model": "openview distributed management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "openview distributed management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.03"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.0"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.0"
      },
      {
        "model": "mc/serviceguard",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jetdirect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.20.00"
      },
      {
        "model": "jetdirect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.08.00"
      },
      {
        "model": "ito/vpo/ovo unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "ems a.03.20",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ems a.03.10",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ems a.03.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "3.1.02"
      },
      {
        "model": "services nmserver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "comtek",
        "version": "3.4"
      },
      {
        "model": "associates unicenter",
        "scope": null,
        "trust": 0.3,
        "vendor": "computer",
        "version": null
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7.1.1"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7.1.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7"
      },
      {
        "model": "openunix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "8.0"
      },
      {
        "model": "openserver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "5.0.6"
      },
      {
        "model": "openserver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "5.0.5"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.14"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.13"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.12"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.11"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.21"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.19"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.18"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.17"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.16"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.15"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.14"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.13"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.12"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.11"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.20"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.10"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.09"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.08"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.07"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.06"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.05"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.04"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.03"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.02"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1"
      },
      {
        "model": "cacheos",
        "scope": null,
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": null
      },
      {
        "model": "web nms msp edition",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "web nms",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "snmp utilities",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "snmp api",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "mediation server",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "management builder",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "fault management toolkit",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "configuration management toolkit",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "cli api",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "agent toolkit java/jmx edition",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "agent toolkit c edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "webcache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "3000"
      },
      {
        "model": "webcache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "1000"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "4900"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "4400"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "3300"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "1100"
      },
      {
        "model": "ps hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "50"
      },
      {
        "model": "ps hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "40"
      },
      {
        "model": "dual speed hub",
        "scope": null,
        "trust": 0.3,
        "vendor": "3com",
        "version": null
      },
      {
        "model": "brocade .0d",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "2.6"
      },
      {
        "model": "ipso",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4.2"
      },
      {
        "model": "ucd-snmp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.2.2"
      },
      {
        "model": "solutions router ip console",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "innerdive",
        "version": "3.3.0.407"
      },
      {
        "model": "jetdirect",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.21.00"
      },
      {
        "model": "jetdirect",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.08.32"
      },
      {
        "model": "ios 12.0 wc 2900xl-lre",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4700"
      },
      {
        "model": "ios 12.2 yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.7"
      },
      {
        "model": "as5850",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios 12.1aa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xe2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 ca1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.2"
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "hosting solution engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1(4.206)"
      },
      {
        "model": "netranger sensor",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yc2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "as5200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vg248 analog phone gateway",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2gs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7750"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(8)"
      },
      {
        "model": "ios 12.0 wt6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5.1"
      },
      {
        "model": "traffic director",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.1.0"
      },
      {
        "model": "ios 12.1 e5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 b2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 t3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3"
      },
      {
        "model": "ios 12.0 xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ya2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5300",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30002.0"
      },
      {
        "model": "cbos b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 11.1 cc4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 4840g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1 aa4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.2"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "39203.0(7)"
      },
      {
        "model": "secure ids network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ios 12.2 mx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7100"
      },
      {
        "model": "cva120",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst native mode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "560"
      },
      {
        "model": "ios 12.1 ea1e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2sa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1005"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.2.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.5.015"
      },
      {
        "model": "ios 12.2 mx1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1.200)"
      },
      {
        "model": "bpx/igx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12000"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4670"
      },
      {
        "model": "ap340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10700"
      },
      {
        "model": "css11000 content services switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.1"
      },
      {
        "model": "ios 12.1 xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "distributed director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2501"
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "intelligent contact manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "ios 12.1 yi1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 2948g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 da",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.6"
      },
      {
        "model": "ios 12.1 ew",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(7.202)"
      },
      {
        "model": "ios 12.2 xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "local director",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 da1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv5"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4232"
      },
      {
        "model": "ios 12.1 ec",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "user registration tool vlan policy server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 dd3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "hosting solution engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(1)"
      },
      {
        "model": "ios 11.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "igx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 t4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8540csr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8240",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 w5",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7010"
      },
      {
        "model": "unity server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst hybrid mode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ios 12.0 wc3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1)"
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "snmpc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.0.4"
      },
      {
        "model": "ios 12.0 st5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0w5",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ios 12.0 sl4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst network analysis module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.2"
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xb3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 db2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82301.2.10"
      },
      {
        "model": "ios 12.1 ey",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ios 12.0 xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.4"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82501.2.10"
      },
      {
        "model": "catalyst msm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "nsp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4"
      },
      {
        "model": "ios 12.1 yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "info center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "ios 12.0 wx5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e8",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "arrowpoint cs11000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "secure ids host sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2950"
      },
      {
        "model": "ios 11.1 ct",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ubr7200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.3"
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1ia",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8540msr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.0(1)"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv4"
      },
      {
        "model": "ios 12.1 t12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "microswitch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1548"
      },
      {
        "model": "ios 12.1 e12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 sx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "access registrar",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "ios 12.0 st",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8510csr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xs1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "bpx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea2b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xz7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 b4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2920"
      },
      {
        "model": "ios 12.1 ea1b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2p",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2600"
      },
      {
        "model": "as5800",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 p2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6200"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1700"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "507"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7000"
      },
      {
        "model": "ios 12.1 e7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.5.1"
      },
      {
        "model": "ios 12.2 t1a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1(2)"
      },
      {
        "model": "ios 12.2 xa5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.1"
      },
      {
        "model": "ios 12.1 ew1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sp1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1ca",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.053"
      },
      {
        "model": "catalyst 2948g-l3",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2900"
      },
      {
        "model": "ios 12.2 mb3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(2)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "ios 12.2 t0a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.7"
      },
      {
        "model": "ios 12.0 wc2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ap350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 dx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sl6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5400",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3500"
      },
      {
        "model": "ios 12.0 wc2b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1400"
      },
      {
        "model": "ios 12.1 yb5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xn1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.1"
      },
      {
        "model": "ios 12.1 e6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(3)"
      },
      {
        "model": "bts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10200"
      },
      {
        "model": "ios 12.0 sx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.8"
      },
      {
        "model": "ubr900",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(2)"
      },
      {
        "model": "ios 12.2 xb4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1aa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 t2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(7)"
      },
      {
        "model": "ios 12.1 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 sa6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "sc2200/vsc3000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wan manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xm2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 aa1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0wx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "infocenter",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2(5)"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "570"
      },
      {
        "model": "call manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sc3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 bc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ex",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8260",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(6)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.4"
      },
      {
        "model": "ios 12.1 yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.0"
      },
      {
        "model": "ios 12.2 xj1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 bc1a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "ios 12.1 xm7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.6"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "ios 12.1 ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4430"
      },
      {
        "model": "catalyst supervisor module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ap352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7600"
      },
      {
        "model": "internet cdn content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0(7)xv"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(3.210)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(13)"
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "505"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.1"
      },
      {
        "model": "catalyst xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2900"
      },
      {
        "model": "netranger",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "ios 12.1 ex3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4"
      },
      {
        "model": "ios 12.0sl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "br350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "ios 12.2 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content delivery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4650"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0"
      },
      {
        "model": "ios 12.0 st3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4500"
      },
      {
        "model": "ios 12.2 xw1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 da3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "br352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xu2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.0"
      },
      {
        "model": "ons metro edge optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15327"
      },
      {
        "model": "ios 12.2 xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "microhub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1500"
      },
      {
        "model": "ios 12.2 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yh3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ios 12.0sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4232-13"
      },
      {
        "model": "ios 11.0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst msfc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "mgx-8220",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "element management framework",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3600"
      },
      {
        "model": "catalyst 4908g-l3",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wgb340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ciscoworks windows/wug",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(5)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios 12.0 s2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8850 r1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 gs6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82501.2.11"
      },
      {
        "model": "ios 12.0 xf1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.5"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.1"
      },
      {
        "model": "rsfc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "ios 12.1 ec1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1 ia",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ws-x6624",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea2a",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yd6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.5"
      },
      {
        "model": "ios 11.1 ca2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "secure pix firewall",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7500"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3200"
      },
      {
        "model": "ios 12.2 xi1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82301.2.11"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "wgb352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cat6k nam",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "br340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xf5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "fasthub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4001.0"
      },
      {
        "model": "ios 12.2 xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1"
      },
      {
        "model": "ios 12.1 ea2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2mb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "rsm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0wt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nrp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.6"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1.4"
      },
      {
        "model": "ws-x6608",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 by2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1600"
      },
      {
        "model": "ios 12.1 xz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xl4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xs?",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.9"
      },
      {
        "model": "catalyst 8510msr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xm1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2500"
      },
      {
        "model": "ios 12.2 ya1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "service expansion shelf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst msfc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "ios 12.0 xe1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "iad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "8110"
      },
      {
        "model": "ios 12.1 ex4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xe2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "ios 12.1 e9",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "ios 11.1ct",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3(3)"
      },
      {
        "model": "ios 12.1 xp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7300"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3550"
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8850 r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xd3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea1a",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "internet cdn content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "ciscoworks windows",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 aa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 12.2 xk2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "esr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10000"
      },
      {
        "model": "ls1010 atm switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 dc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.7.002"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4450"
      },
      {
        "model": "ios 12.1 xi8",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3900"
      },
      {
        "model": "ios 11.3 db1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "800"
      },
      {
        "model": "mc3810",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 by",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1cc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7200"
      },
      {
        "model": "content delivery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4630"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(4)"
      },
      {
        "model": "catalyst 4912g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "intelligent contact manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "cbos ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 12.0dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "ios 12.2 xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ubr10000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(2)"
      },
      {
        "model": "ios 12.2 xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.1"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-0013",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2002-0013",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2002-0013",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#107186",
            "trust": 0.8,
            "value": "69.26"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#854306",
            "trust": 0.8,
            "value": "42.64"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200202-004",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2002-0013",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite.  NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor.  This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code \u30fb If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability.  It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. \nThe resultant crash may be due to a buffer overflow condition.  If this is the case, attackers may be able to exploit this vulnerability to execute arbitrary code. \nMultiple vulnerabilities have been discovered in a number of SNMP implementations.  The vulnerabilities are known to exist in the process of decoding and interpreting SNMP request messages. \nAmong the possible consequences are denial of service and allowing attackers to compromise target systems.  These depend on the individual vulnerabilities in each affected product.  A general report for multiple vendors was initially published on February 12 (Bugtraq IDs 4088 and 4089), however more information is now available and a separate Bugtraq ID has been allocated for the Cisco Operating Systems and Appliances vulnerabilities. \nIt is reportedly possible for a remote attacker to create a denial of service condition by transmitting a malformed SNMP request to a vulnerable Cisco Operating System or Appliance.  The affected device may reset, or require a manual reset to regain functionality. \n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nCERT Advisory CA-2002-03: Multiple Vulnerabilities in Many\nImplementations of the Simple Network Management Protocol (SNMP)\n\n   Original release date: February 12, 2002\n   Last revised: --\n   Source: CERT/CC\n\n   A complete revision history can be found at the end of this file. \n\nSystems Affected\n\n   Products  from  a  very  wide  variety of vendors may be affected. See\n   Vendor Information for details from vendors who have provided feedback\n   for this advisory. \n\n   In  addition to the vendors who provided feedback for this advisory, a\n   list  of  vendors  whom  CERT/CC contacted regarding these problems is\n   available from\n   http://www.kb.cert.org/vuls/id/854306\n   http://www.kb.cert.org/vuls/id/107186 \n\n   Many  other systems making use of SNMP may also be vulnerable but were\n   not specifically tested. \n\n   In addition to this advisory, we also have an FAQ available at\n   http://www.cert.org/tech_tips/snmp_faq.html\n\nI. \n   Version  1  of  the  protocol  (SNMPv1)  defines several types of SNMP\n   messages  that  are  used  to  request  information  or  configuration\n   changes,  respond  to  requests,  enumerate  SNMP  objects,  and  send\n   unsolicited  alerts.  The  Oulu  University  Secure  Programming Group\n   (OUSPG,  http://www.ee.oulu.fi/research/ouspg/)  has reported numerous\n   vulnerabilities in SNMPv1 implementations from many different vendors. \n   More information about SNMP and OUSPG can be found in Appendix C\n\n   OUSPG\u0027s  research  focused  on  the  manner in which SNMPv1 agents and\n   managers  handle  request  and  trap  messages. A trap message\n     may  indicate  a warning or error condition or otherwise notify the\n     manager about the agent\u0027s state. Request\n     messages  might be issued to obtain information from an agent or to\n     instruct  the  agent to configure the host device. \n\n   Vulnerabilities  in  the  decoding  and  subsequent processing of SNMP\n   messages  by  both managers and agents may result in denial-of-service\n   conditions,  format string vulnerabilities, and buffer overflows. Some\n   vulnerabilities  do  not  require  the SNMP message to use the correct\n   SNMP community string. \n\n   These   vulnerabilities   have   been  assigned  the  CVE  identifiers\n   CAN-2002-0012 and CAN-2002-0013, respectively. \n\nII. \n\nIII. Solution\n\n   Note  that  many  of  the  mitigation steps recommended below may have\n   significant  impact on your everyday network operations and/or network\n   architecture.  Ensure  that  any  changes  made based on the following\n   recommendations  will  not  unacceptably  affect  your ongoing network\n   operations capability. \n\nApply a patch from your vendor\n\n   Appendix A contains information provided by vendors for this advisory. \n   Please  consult this appendix to determine if you need to contact your\n   vendor directly. \n\nDisable the SNMP service\n\n   As  a  general  rule,  the CERT/CC recommends disabling any service or\n   capability   that   is   not   explicitly  required,  including  SNMP. \n   Unfortunately,  some  of  the  affected  products exhibited unexpected\n   behavior  or  denial  of  service conditions when exposed to the OUSPG\n   test  suite  even  if  SNMP was not enabled. In these cases, disabling\n   SNMP should be used in conjunction with the filtering practices listed\n   below to provide additional protection. \n\nIngress filtering\n\n   As a temporary measure, it may be possible to limit the scope of these\n   vulnerabilities  by  blocking  access  to SNMP services at the network\n   perimeter. \n\n   Ingress  filtering  manages the flow of traffic as it enters a network\n   under  your  administrative  control.  Servers  are typically the only\n   machines that need to accept inbound traffic from the public Internet. \n   In  the  network usage policy of many sites, there are few reasons for\n   external hosts to initiate inbound traffic to machines that provide no\n   public  services.  Thus,  ingress filtering should be performed at the\n   border   to   prohibit   externally   initiated   inbound  traffic  to\n   non-authorized  services. For SNMP, ingress filtering of the following\n   ports  can  prevent  attackers  outside of your network from impacting\n   vulnerable  devices  in  the  local  network  that  are not explicitly\n   authorized to provide public SNMP services. \n\n   snmp     161/udp     # Simple Network Management Protocol (SNMP)\n   snmp     162/udp     # SNMP system management messages\n\n   The  following  services  are  less  common,  but  may be used on some\n   affected products\n\n   snmp               161/tcp     #  Simple  Network  Management Protocol\n   (SNMP)\n   snmp               162/tcp     # SNMP system management messages\n   smux               199/tcp     # SNMP Unix Multiplexer\n   smux               199/udp     # SNMP Unix Multiplexer\n   synoptics-relay    391/tcp     # SynOptics SNMP Relay Port\n   synoptics-relay    391/udp     # SynOptics SNMP Relay Port\n   agentx             705/tcp     # AgentX\n   snmp-tcp-port     1993/tcp     # cisco SNMP TCP port\n   snmp-tcp-port     1993/udp     # cisco SNMP TCP port\n\n   As  noted  above, you should carefully consider the impact of blocking\n   services that you may be using. \n\n   It  is  important  to note that in many SNMP implementations, the SNMP\n   daemon may bind to all IP interfaces on the device. This has important\n   consequences  when  considering  appropriate packet filtering measures\n   required  to  protect  an  SNMP-enabled device. For example, even if a\n   device  disallows  SNMP  packets  directed  to the IP addresses of its\n   normal  network  interfaces, it may still be possible to exploit these\n   vulnerabilities  on that device through the use of packets directed at\n   the following IP addresses:\n     * \"all-ones\" broadcast address\n     * subnet broadcast address\n     * any  internal  loopback  addresses  (commonly  used in routers for\n       management purposes, not to be confused with the IP stack loopback\n       address 127.0.0.1)\n\n   Careful  consideration  should  be  given  to  addresses  of the types\n   mentioned  above  by  sites  planning  for packet filtering as part of\n   their mitigation strategy for these vulnerabilities. \n\n   Finally,  sites may wish to block access to the following RPC services\n   related to SNMP (listed as name, program ID, alternate names)\n\n   snmp               100122  na.snmp snmp-cmc snmp-synoptics snmp-unisys\n   snmp-utk\n   snmpv2             100138  na.snmpv2     # SNM Version 2.2.2\n   snmpXdmid          100249\n\n   Please  note  that  this workaround may not protect vulnerable devices\n   from internal attacks. \n\nFilter SNMP traffic from non-authorized internal hosts\n\n   In  many networks, only a limited number of network management systems\n   need to originate SNMP request messages. This can reduce, but not wholly eliminate, the\n   risk  from  internal attacks. However, it may have detrimental effects\n   on  network  performance  due  to  the  increased  load imposed by the\n   filtering, so careful consideration is required before implementation. \n   Similar  caveats  to  the  previous workaround regarding broadcast and\n   loopback addresses apply. \n\nChange default community strings\n\n   Most  SNMP-enabled  products  ship  with  default community strings of\n   \"public\"  for read-only access and \"private\" for read-write access. As\n   with   any   known  default  access  control  mechanism,  the  CERT/CC\n   recommends  that network administrators change these community strings\n   to  something  of  their  own  choosing.  However, even when community\n   strings  are changed from their defaults, they will still be passed in\n   plaintext and are therefore subject to packet sniffing attacks. SNMPv3\n   offers additional capabilities to ensure authentication and privacy as\n   described in RFC2574. \n\n   Because  many of the vulnerabilities identified in this advisory occur\n   before  the  community  strings are evaluated, it is important to note\n   that  performing  this  step  alone  is not sufficient to mitigate the\n   impact  of  these vulnerabilities. Nonetheless, it should be performed\n   as part of good security practice. \n\nSegregate SNMP traffic onto a separate management network\n\n   In  situations  where  blocking  or  disabling  SNMP  is not possible,\n   exposure  to  these  vulnerabilities may be limited by restricting all\n   SNMP  access  to  separate,  isolated management networks that are not\n   publicly  accessible.  Although  this would ideally involve physically\n   separate networks, that kind of separation is probably not feasible in\n   most environments. Mechanisms such as virtual LANs (VLANs) may be used\n   to  help  segregate  traffic  on  the same physical network. Note that\n   VLANs  may  not  strictly  prevent  an  attacker from exploiting these\n   vulnerabilities,  but  they may make it more difficult to initiate the\n   attacks. \n\n   Another  option  is  for  sites  to  restrict SNMP traffic to separate\n   virtual private networks (VPNs), which employ cryptographically strong\n   authentication. \n\n   Note  that  these  solutions may require extensive changes to a site\u0027s\n   network architecture. \n\nEgress filtering\n\n   Egress  filtering  manages  the flow of traffic as it leaves a network\n   under your administrative control. There is typically limited need for\n   machines providing public services to initiate outbound traffic to the\n   Internet.  In  the  case  of  SNMP  vulnerabilities,  employing egress\n   filtering on the ports listed above at your network border can prevent\n   your network from being used as a source for attacks on other sites. \n\nDisable stack execution\n\n   Disabling  executable  stacks  (on systems where this is configurable)\n   can  reduce  the  risk  of  \"stack  smashing\"  attacks  based on these\n   vulnerabilities. Although this does not provide 100 percent protection\n   against exploitation of these vulnerabilities, it makes the likelihood\n   of a successful exploit much smaller. On many UNIX systems, executable\n   stacks can be disabled by adding the following lines to /etc/system:\n\n   set noexec_user_stack = 1 set noexec_user_stack_log = 1\n\n   Note  that  this  may  go  against the SPARC and Intel ABIs and can be\n   bypassed  as required in programs with mprotect(2). For the changes to\n   take effect you will then need to reboot. \n\n   Other  operating  systems and architectures also support the disabling\n   of executable stacks either through native configuration parameters or\n   via  third-party  software.  Consult  your  vendor(s)  for  additional\n   information. \n\nShare tools and techniques\n\n   Because  dealing with these vulnerabilities to systems and networks is\n   so  complex, the CERT/CC will provide a forum where administrators can\n   share  ideas  and  techniques  that  can  be  used  to  develop proper\n   defenses.  We  have created an unmoderated mailing list for system and\n   network administrators to discuss helpful techniques and tools. \n\n   You  can  subscribe to the mailing list by sending an email message to\n   majordomo@cert.org. In the body of the message, type\n\n   subscribe snmp-forum\n\n   After you receive the confirmation message, follow the instructions in\n   the message to complete the subscription process. \n\nAppendix A. - Vendor Information\n\n   This  appendix  contains  information  provided  by  vendors  for this\n   advisory.  As  vendors  report new information to the CERT/CC, we will\n   update this section and note the changes in our revision history. If a\n   particular  vendor  is  not  listed  below, we have not received their\n   comments. \n\nAdventNet\n\n     This  is in reference to your notification regarding [VU#107186 and\n     VU#854306]  and  OUSPG#0100.   AdventNet  Inc.  has reproduced this\n     behavior  in  their  products and coded a Service Pack fix which is\n     currently   in   regression   testing   in  AdventNet  Inc.\u0027s  Q.A. \n     organization.    The  release  of  AdventNet  Inc\u0027s.  Service  Pack\n     correcting  the  behavior  outlined in VU#617947, and OUSPG#0100 is\n     scheduled  to  be  generally  available  to all of AdventNet Inc.\u0027s\n     customers by February 20, 2002. \n\nAvaya\n\n     Avaya  Inc. \n\nCacheFlow\n\n     The  purpose of this email is to advise you that CacheFlow Inc. has\n     provided a software update. Please be advised that updated versions\n     of  the  software  are  now  available  for all supported CacheFlow\n     hardware  platforms,  and may be obtained by CacheFlow customers at\n     the following URL:\n\n          http://download.cacheflow.com/\n\n   The  specific reference to the software update is contained within the\n   Release  Notes  for  CacheOS  Versions 3.1.22 Release ID 17146, 4.0.15\n   Release ID 17148, 4.1.02 Release ID 17144 and 4.0.15 Release ID 17149. \n\n   RELEASE NOTES FOR CACHEFLOW SERVER ACCELERATOR PRODUCTS:\n     * http://download.cacheflow.com/release/SA/4.0.15/relnotes.htm\n\n   RELEASE NOTES FOR CACHEFLOW CONTENT ACCELERATOR PRODUCTS:\n     * http://download.cacheflow.com/release/CA/3.1.22/relnotes.htm\n     * http://download.cacheflow.com/release/CA/4.0.15/relnotes.htm\n     * http://download.cacheflow.com/release/CA/4.1.02/relnotes.htm\n\n     * SR   1-1647517,   VI  13045:  This  update  modified  a  potential\n     vulnerability by using an SNMP test tools exploit. \n\n3Com Corporation\n\n     A  vulnerability to an SNMP packet with an invalid length community\n     string  has  been  resolved  in  the  following products. Customers\n     concerned  about  this  weakness should ensure that they upgrade to\n     the following agent versions:\n     PS Hub 40\n     2.16 is due Feb 2002\n     PS Hub 50\n     2.16 is due Feb 2002\n     Dual Speed Hub\n     2.16 is due Jan 2002\n     Switch 1100/3300\n     2.68 is available now\n     Switch 4400\n     2.02 is available now\n     Switch 4900\n     2.04 is available now\n     WebCache1000/3000\n     2.00 is due Jan 2002\n\nCaldera\n\n     Caldera   International,  Inc.  has  reproduced  faulty behavior in\n     Caldera SCO OpenServer 5, Caldera UnixWare 7, and Caldera Open UNIX\n     8.  We have coded a software fix for  supported versions of Caldera\n     UnixWare  7  and  Caldera  Open UNIX 8 that will  be available from\n     our   support   site  at  http://stage.caldera.com/support/security\n     immediately  following the publication of this CERT announcement. A\n     fix  for  supported versions of OpenServer 5 will be available at a\n     later date. \n\nCisco Systems\n\n     Cisco  Systems  is  addressing  the  vulnerabilities  identified by\n     VU#854306  and VU#107186 across its entire product line. Cisco will\n     publish    a    security   advisory   with   further   details   at\n     http://www.cisco.com/go/psirt/. \n\nCompaq Computer Corporation\n\n     x-ref: SSRT0779U SNMP\n     At  the time of writing this document, COMPAQ continues to evaluate\n     this potential problem and when new versions of SNMP are available,\n     COMPAQ  will implement solutions based on the new code. Compaq will\n     provide  notice  of  any  new  patches  as  a result of that effort\n     through  standard  patch  notification  procedures and be available\n     from your normal Compaq Services support channel. \n\nComputer Associates\n\n     Computer  Associates  has  confirmed Unicenter vulnerability to the\n     SNMP  advisory identified by CERT notification reference [VU#107186\n     \u0026   VU#854306]   and   OUSPG#0100.   We  have  produced  corrective\n     maintenance  to  address  these  vulnerabilities,  which  is in the\n     process  of publication for all applicable releases / platforms and\n     will  be  offered  through the CA Support site.  Please contact our\n     Technical    Support   organization   for   information   regarding\n     availability / applicability for your specific configuration(s). \n\nCOMTEK Services, Inc. \n\n     NMServer  for  AS/400  is  not  an SNMP master and is therefore not\n     vulnerable.  However  this  product  requires the use of the AS/400\n     SNMP  master  agent  supplied  by  IBM. \n\n     NMServer   for  OpenVMS  has  been  tested  and  has  shown  to  be\n     vulnerable.  COMTEK  Services  is  preparing  a new release of this\n     product  (version  3.5)  which will contain a fix for this problem. \n     This  new  release  is  scheduled to be available in February 2002. \n     Contact COMTEK Services for further information. \n\n     NMServer  for VOS has not as yet been tested; vulnerability of this\n     agent  is  unknown.  Contact for further information on the testing\n     schedule of the VOS product. \n\nCovalent Technologies\n\n     Covalent Technologies ERS (Enterprise Ready Server), Secure Server,\n     and  Conductor  SNMP module are not vulnerable according to testing\n     performed   in   accordance  with  CERT  recommendations.  Security\n     information for Covalent products can be found at www.covalent.net\n\nDartware, LLC\n\n     Dartware,  LLC  (www.dartware.com)  supplies  two products that use\n     SNMPv1  in  a  manager  role,  InterMapper  and SNMP Watcher.  This statement applies to all present\n     and past versions of these two software packages. \n\nDMH Software\n\n     DMH  Software  is  in  the  process of evaluating and attempting to\n     reproduce this behavior. \n     It  is  unclear at this point if our snmp-agent is sensitive to the\n     tests described above. \n     If  any  problems  will  be  discovered,  DMH  Software will code a\n     software fix. \n     The  release of DMH Software OS correcting the behavior outlined in\n     VU#854306, VU#107186, and OUSPG#0100 will be generally available to\n     all of DMH Software\u0027s customers as soon as possible. \n\nEnGarde Secure Linux\n\n     EnGarde  Secure  Linux  did  not  ship any SNMP packages in version\n     1.0.1 of our distribution, so we are not vulnerable to either bug. \n\nFreeBSD\n\n     FreeBSD  does  not  include any SNMP software by default, and so is\n     not vulnerable.  However, the FreeBSD Ports Collection contains the\n     UCD-SNMP   /   NET-SNMP   package.    Package   versions  prior  to\n     ucd-snmp-4.2.3  are  vulnerable.   The upcoming FreeBSD 4.5 release\n     will  ship  the  corrected  version  of  the  UCD-SNMP  /  NET-SNMP\n     package.   In  addition,  the  corrected version of the packages is\n     available from the FreeBSD mirrors. \n\n     FreeBSD   has   issued  the  following  FreeBSD  Security  Advisory\n     regarding the UCD-SNMP / NET-SNMP package:\n     ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:09. \n     snmp.asc. \n\nHewlett-Packard Company\n\n     SUMMARY - known vulnerable:\n     ========================================\n     hp procurve switch 2524\n     NNM  (Network Node Manager)\n     JetDirect Firmware (Older versions only)\n     HP-UX Systems running snmpd or OPENVIEW\n     MC/ServiceGuard\n     EMS\n     Still under investigation:\n     SNMP/iX (MPE/iX)\n     ========================================\n     _________________________________________________________\n     ---------------------------------------------------------\n     hp procurve switch 2524 \n     ---------------------------------------------------------\n     hp procurve switch 2525 (product J4813A) is vulnerable to some\n     issues, patches in process. Watch for the associated HP\n     Security Bulletin. \n     ---------------------------------------------------------\n     NNM  (Network Node Manager)\n     ---------------------------------------------------------\n     Some problems were found in NNM product were related to\n     trap handling. Patches in process. Watch for the\n     associated HP Security Bulletin. \n     ---------------------------------------------------------\n     JetDirect Firmware (Older versions only)\n     ---------------------------------------------------------\n     ONLY some older versions of JetDirect Firmware are\n     vulnerable to some of the issues.  The older firmware\n     can be upgraded in most cases, see list below. \n     JetDirect Firmware Version    State\n     ==========================    =====\n        X.08.32 and higher     NOT Vulnerable\n        X.21.00 and higher     NOT Vulnerable\n     JetDirect Product Numbers that can be freely\n     upgraded to X.08.32 or X.21.00 or higher firmware. \n     EIO (Peripherals Laserjet 4000, 5000, 8000, etc...)\n     J3110A 10T\n     J3111A 10T/10B2/LocalTalk\n     J3112A Token Ring (discontinued)\n     J3113A 10/100 (discontinued)\n     J4169A 10/100\n     J4167A Token Ring\n     MIO (Peripherals LaserJet 4, 4si, 5si, etc...)\n     J2550A/B 10T (discontinued)\n     J2552A/B 10T/10Base2/LocalTalk (discontinued)\n     J2555A/B Token Ring (discontinued)\n     J4100A 10/100\n     J4105A Token Ring\n     J4106A 10T\n     External Print Servers\n     J2591A EX+ (discontinued)\n     J2593A EX+3 10T/10B2 (discontinued)\n     J2594A EX+3 Token Ring (discontinued)\n     J3263A 300X 10/100\n     J3264A 500X Token Ring\n     J3265A 500X 10/100\n     ----------------------------------------------------------\n     HP-UX Systems running snmpd or OPENVIEW\n     ----------------------------------------------------------\n     The following patches are available now:\n       PHSS_26137 s700_800 10.20 OV EMANATE14.2 Agent Consolidated Patch\n       PHSS_26138 s700_800 11.X  OV EMANATE14.2 Agent Consolidated Patch\n       PSOV_03087 EMANATE Release 14.2 Solaris 2.X  Agent Consolidated\n     Patch\n     All three patches are available from:\n     http://support.openview.hp.com/cpe/patches/\n     In addition PHSS_26137 and PHSS_26138 will soon be available from:\n     http://itrc.hp.com\n     ================================================================\n     NOTE: The patches are labeled OV(Open View). However, the patches\n     are also applicable to systems that are not running Open View. \n     =================================================================\n     Any   HP-UX  10.X  or  11.X  system  running  snmpd  or  snmpdm  is\n     vulnerable. \n     To determine if your HP-UX system has snmpd or snmpdm installed:\n       swlist -l file | grep snmpd\n     If a patch is not available for your platform or you cannot install\n     an  available  patch,  snmpd and snmpdm can be disabled by removing\n     their\n     entries  from  /etc/services  and  removing the execute permissions\n     from\n     /usr/sbin/snmpd and /usr/sbin/snmpdm. \n     ----------------------------------------------------------------\n     Investigation completed, systems vulnerable. \n     ----------------------------------------------------------------\n     MC/ServiceGuard\n     Event Monitoring System  (EMS)\n     ----------------------------------------------------------------\n       Still under investigation:\n     ----------------------------------------------------------------\n     SNMP/iX (MPE/iX)\n\nHirschmann Electronics GmbH \u0026 Co. KG\n\n     Hirschmann  Electronics  GmbH  \u0026  Co.  KG supplies a broad range of\n     networking  products,  some  of  which  are  affected  by  the SNMP\n     vulnerabilities  identified by CERT Coordination Center. Hirschmann customers may contact our Competence\n     Center (phone +49-7127-14-1538, email:\n     ans-support@nt.hirschmann.de)     for    additional    information,\n     especially  regarding  availability  of  latest  firmware  releases\n     addressing the SNMP vulnerabilities. \n\nIBM Corporation\n\n     Based  upon  the  results  of  running  the  test  suites  we  have\n     determined  that  our  version  of  SNMP  shipped  with  AIX is NOT\n     vulnerable. \n\nInnerdive Solutions, LLC\n\n     Innerdive Solutions, LLC has two SNMP based products:\n     1. The \"SNMP MIB Scout\"\n     (http://www.innerdive.com/products/mibscout/)\n     2. The \"Router IP Console\" (http://www.innerdive.com/products/ric/)\n     The \"SNMP MIB Scout\" is not vulnerable to either bug. \n     The \"Router IP Console\" releases prior to 3.3.0.407 are vulnerable. \n     The release of \"Router IP Console\" correcting the behavior outlined\n     in  OUSPG#0100  is  3.3.0.407 and is already available on our site. \n     Also,  we  will  notify all our customers about this new release no\n     later than March 5, 2002. \n\nJuniper Networks\n\n     This  is  in reference to your notification regarding CAN-2002-0012\n     and  CAN-2002-0013.   Juniper Networks has reproduced this behavior\n     and coded a software fix.  The fix will be included in all releases\n     of  JUNOS Internet software built after January 5, 2002.  Customers\n     with  current  support contracts can download new software with the\n     fix from Juniper\u0027s web site at www.juniper.net. \n     Note: The behavior described in CAN-2002-0012 and CAN-2002-0013 can\n     only  be  reproduced  in JUNOS Internet software if certain tracing\n     options  are  enabled.   These options are generally not enabled in\n     production routers. \n\nLantronix, Inc. \n\n     Lantronix  is  committed  to  resolving  security  issues  with our\n     products.  The SNMP security bug you reported has been fixed in LRS\n     firmware version B1.3/611(020123). \n\nLotus Development Corporation\n\n     Lotus    Software   evaluated   the   Lotus   Domino   Server   for\n     vulnerabilities using the test suite materials provided by OUSPG. \n     This  problem  does  not affect default installations of the Domino\n     Server.   However,  SNMP  agents  can  be  installed from the CD to\n     provide  SNMP  services for the Domino Server (these are located in\n     the   /apps/sysmgmt/agents   directory).    The  optional  platform\n     specific  master  and  encapsulator  agents included with the Lotus\n     Domino  SNMP  Agents  for  HP-UX  and Solaris have been found to be\n     vulnerable.  For  those  platforms,  customers  should  upgrade  to\n     version  R5.0.1  a  of  the Lotus Domino SNMP Agents, available for\n     download  from the Lotus Knowledge Base on the IBM Support Web Site\n     (http://www.ibm.com/software/lotus/support/).   Please   refer   to\n     Document  #191059,  \"Lotus Domino SNMP Agents R5.0.1a\", also in the\n     Lotus Knowledge Base, for more details. \n\nLOGEC Systems Inc\n\n     The  products  from  LOGEC  Systems are exposed to SNMP only via HP\n     OpenView.  We  do  not have an implementation of SNMP ourselves. As\n     such,  there is nothing in our products that would be an issue with\n     this alert. \n\nLucent\n\n     Lucent is aware of reports that there is a vulnerability in certain\n     implementations  of  the  SNMP (Simple Network Management Protocol)\n     code  that  is  used in data switches and other hardware throughout\n     the telecom industry. \n     As soon as we were notified by CERT, we began assessing our product\n     portfolio  and  notifying  customers  with  products  that might be\n     affected. \n     Our  5ESS  switch  and  most  of  our  optical  portfolio  were not\n     affected.   Our  core  and  edge  ATM switches and most of our edge\n     access  products  are  affected, but we have developed, tested, and\n     deployed  fixes for many of those products to our customers. \n     We consider the security and reliability of our customers\u0027 networks\n     to  be  one  of  our  critical  measures  of success. We take every\n     reasonable measure to ensure their satisfaction. \n     In  addition,  we  are  working  with  customers on ways to further\n     enhance the security they have in place today. \n\nMarconi\n\n     Marconi  supplies  a  broad range of telecommunications and related\n     products,  some  of  which are affected by the SNMP vulnerabilities\n     identified  here. Those\n     Marconi   customers   with  support  entitlement  may  contact  the\n     appropriate   Technical  Assistance  Center  (TAC)  for  additional\n     information.  Those not under support entitlement may contact their\n     sales representative. \n\nMicrosoft Corporation\n\n     The  Microsoft  Security Reponse [sic] Center has investigated this\n     issue, and provides the following information.  The  SNMP v1 service is not installed or running by\n     default on any version of Windows. A patch is underway to eliminate\n     the  vulnerability.  In  the  meantime,  we recommend that affected\n     customers disable the SNMP v1 service. \n\n     Details:\n     An  SNMP  v1 service ships on the CDs for Windows 95, 98, and 98SE. \n     It  is  not  installed  or  running  by  default  on  any  of these\n     platforms.  An SNMP v1 is NOT provided for Windows ME.  However, it\n     is  possible  that  Windows  98  machines  which  had  the  service\n     installed  and  were  upgraded would still have the service.  Since\n     SNMP  is  not  supported for WinME, customers in this situation are\n     urged to remove the SNMP service. \n     An  SNMP  v1  service  is  available  on  Windows NT 4.0 (including\n     Terminal  Server  Edition) and Windows 2000 but is not installed or\n     running  by  default  on any of these platforms.Windows XP does not\n     ship with an SNMP v1 service. \n\n     Remediation:\n     A  patch  is  underway  for  the  affected  platforms,  and will be\n     released  shortly.  In  the  meantime,  Microsoft  recommends  that\n     customers  who  have  the  SNMP  v1  service  running disable it to\n     protect their systems. Following are instruction for doing this:\n\n     Windows 95, 98 and 98SE:\n     1. In Control Panel, double-click Network. \n     2. On  the  Configuration  tab,  select Microsoft SNMP Agent from the\n        list of installed components. \n     3. Click Remove\n\n     Check the following keys and confirm that snmp.exe is not listed. \n     HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunSer\n     vices\n     HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n \n     For Windows XP:\n     1. Right-click on My Computer and select Manage\n     2. Click on Services and Applications, then on Services\n     3. Location  SNMP  on  the list of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click  OK  to  close  the  dialoge  [sic], then close the Computer\n        Management window. \n   \n     For Windows NT 4.0 (including Terminal Server Edition):\n     1. Select Start, then Settings. \n     2. Select Control Panel, then click on the Services Icon\n     3. Locate  SNMP  on  the  list  of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click OK to close the dialoge [sic], then close Control Panel\n\n     Windows 2000:\n     1. Right-click on My Computer and select Manage\n     2. Click on Services and Applications, then on Services\n     3. Location  SNMP  on  the list of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click  OK  to  close  the  dialoge  [sic], then close the Computer\n        Management window. \n\nMultinet\n\n     MultiNet  and  TCPware customers should contact Process Software to\n     check  for  the availability of patches for this issue. A couple of\n     minor  problems were found and fixed, but there is no security risk\n     related to the SNMP code included with either product. \n\nNetaphor\n\n     NETAPHOR  SOFTWARE INC. is the creator of Cyberons for Java -- SNMP\n     Manager  Toolkit  and Cyberons for Java -- NMS Application Toolkit,\n     two   Java  based  products  that  may  be  affected  by  the  SNMP\n     vulnerabilities  identified  here.  The  manner  in  which they are\n     affected  and the actions required (if any) to avoid being impacted\n     by  exploitation  of  these  vulnerabilities,  may  be  obtained by\n     contacting  Netaphor  via email at info@netaphor.com Customers with\n     annual support may contact support@netaphor.com directly. Those not\n     under    support    entitlement   may   contact   Netaphor   sales:\n     sales@netaphor.com or (949) 470 7955 in USA. \n\nNetBSD\n\n     NetBSD does not ship with any SNMP tools in our \u0027base\u0027 releases. We\n     do  provide  optional  packages  which  provide various support for\n     SNMP.  These  packages  are  not installed by default, nor are they\n     currently  provided  as  an  install option by the operating system\n     installation tools. A system administrator/end-user has to manually\n     install this with our package management tools. These SNMP packages\n     include:\n          + netsaint-plugin-snmp-1.2.8.4  (SNMP  monitoring  plug-in  for\n            netsaint)\n          + p5-Net-SNMP-3.60 (perl5 module for SNMP queries)\n          + p5-SNMP-3.1.0  (Perl5  module for interfacing to the UCD SNMP\n            library\n          + p5-SNMP_Session-0.83   (perl5  module  providing  rudimentary\n            access to remote SNMP agents)\n          + ucd-snmp-4.2.1  (Extensible  SNMP  implementation) (conflicts\n            with ucd-snmp-4.1.2)\n          + ucd-snmp-4.1.2  (Extensible  SNMP  implementation) (conflicts\n            with ucd-snmp-4.2.1)\n\n     We    do   provide   a   software   monitoring   mechanism   called\n     \u0027audit-packages\u0027,  which allows us to highlight if a package with a\n     range  of  versions  has  a potential vulnerability, and recommends\n     that the end-user upgrade the packages in question. \n\nNetscape Communications Corporation\n\n     Netscape  continues  to be committed to maintaining a high level of\n     quality  in  our  software  and  service  offerings.  Part  of this\n     commitment  includes  prompt response to security issues discovered\n     by organizations such as the CERT Coordination Center. \n     According  to a recent CERT/CC advisory, The Oulu University Secure\n     Programming  Group (OUSPG) has reported numerous vulnerabilities in\n     multiple  vendor  SNMPv1 implementations. \n     We  have  carefully  examined the reported findings, performing the\n     tests  suggested  by the OUSPG to determine whether Netscape server\n     products  were  subject to these vulnerabilities. It was determined\n     that several products fell into this category. As a result, we have\n     created  fixes  which will resolve the issues, and these fixes will\n     appear  in  future  releases  of  our  product  line. To Netscape\u0027s\n     knowledge,  there  are  no known instances of these vulnerabilities\n     being exploited and no customers have been affected to date. \n     When such security warnings are issued, Netscape has committed to -\n     and will continue to commit to - resolving these issues in a prompt\n     and timely fashion, ensuring that our customers receive products of\n     the highest quality and security. \n\nNET-SNMP\n\n     All  ucd-snmp  version  prior  to  4.2.2  are  susceptible  to this\n     vulnerability  and  users  of  versions  prior to version 4.2.2 are\n     encouraged   to   upgrade   their  software  as  soon  as  possible\n     (http://www.net-snmp.org/download/).  Version  4.2.2 and higher are\n     not susceptible. \n\nNetwork Associates\n\n     PGP is not affected, impacted, or otherwise related to this VU#. \n\nNetwork Computing Technologies\n\n     Network   Computing   Technologies  has  reviewed  the  information\n     regarding  SNMP  vulnerabilities and is currently investigating the\n     impact to our products. \n\nNokia\n\n     This  vulnerability  is  known  to affect IPSO versions 3.1.3, 3.3,\n     3.3.1,  3.4,  and  3.4.1.   Patches  are  currently  available  for\n     versions  3.3,  3.3.1,  3.4  and  3.4.1 for download from the Nokia\n     website.   In  addition,  version  3.4.2  shipped  with  the  patch\n     incorporated,  and the necessary fix will be included in all future\n     releases of IPSO. \n     We  recommend customers install the patch immediately or follow the\n     recommended precautions below to avoid any potential exploit. \n     If you are not using SNMP services, including Traps, simply disable\n     the   SNMP   daemon   to   completely   eliminate   the   potential\n     vulnerability. \n     If   you  are  using  only  SNMP  Traps  and  running  Check  Point\n     FireWall-1,  create  a  firewall  policy  to disallow incoming SNMP\n     messages on all appropriate interfaces. Traps will continue to work\n     normally. \n\nNortel Networks\n\n     The  CERT Coordination Center has issued a broad based alert to the\n     technology industry, including Nortel Networks, regarding potential\n     security   vulnerabilities   identified   in   the  Simple  Network\n     Management  Protocol  (SNMP),  a  common  networking  standard. The\n     company   is   working   with  CERT  and  other  network  equipment\n     manufacturers, the U.S. Government, service providers, and software\n     suppliers to assess and address this issue. \n\nNovell\n\n     Novell ships SNMP.NLM and SNMPLOG.NLM with NetWare 4.x, NetWare 5.x\n     and  6.0  systems. The SNMP and SNMPLOG vulnerabilities detected on\n     NetWare  are  fixed and will be available through NetWare 6 Support\n     Pack 1 \u0026 NetWare 5.1 Support Pack 4. Support packs are available at\n     http://support.novell.com/tools/csp/\n\nOpenBSD\n\n     OpenBSD does not ship SNMP code. \n\nQualcomm\n\n     WorldMail  does  not  support SNMP by default, so customers who run\n     unmodified installations are not vulnerable. \n\nRedback Networks, Inc. \n\n     Redback  Networks,  Inc.  has  identified that the vulnerability in\n     question  affects  certain versions of AOS software on the SMS 500,\n     SMS  1800,  and  SMS 10000 platforms, and is taking the appropriate\n     steps necessary to correct the issue. \n\nRed Hat\n\n     RedHat has released a security advisiory [sic] at\n     http://www.redhat.com/support/errata/RHSA-2001-163.html\n     with  updated  versions  of  the ucd-snmp package for all supported\n     releases and architectures. For more information or to download the\n     update please visit this page. \n\nSGI\n\n     SGI  acknowledges  the SNMP vulnerabilities reported by CERT and is\n     currently  investigating. \n     For  the  protection  of  all our customers, SGI does not disclose,\n     discuss  or  confirm vulnerabilities until a full investigation has\n     occurred  and  any  necessary  patch(es)  or  release  streams  are\n     available  for all vulnerable and supported IRIX operating systems. \n     Until SGI has more definitive information to provide, customers are\n     encouraged  to  assume  all security vulnerabilities as exploitable\n     and  take  appropriate  steps  according  to  local  site  security\n     policies   and   requirements.   As   further  information  becomes\n     available,  additional advisories will be issued via the normal SGI\n     security  information  distribution  methods  including the wiretap\n     mailing list on http://www.sgi.com/support/security/. \n\nSNMP Research International\n\n     SNMP  Research  has  made  the following vendor statement. They are\n     likely  to  revise  and  expand  the  statement as the date for the\n     public vulnerability announcement draws nearer.   Users  maintaining\n     earlier  releases should update to the current release if they have\n     not  already  done  so. Other Stonesoft\u0027s products are\n     still   under   investigation. \n\n     Sun\u0027s  SNMP  product,  Solstice  Enterprise Agents (SEA), described\n     here:\n     http://www.sun.com/solstice/products/ent.agents/\n     is  affected  by VU#854306 but not VU#107186. More specifically the\n     main  agent  of  SEA, snmpdx(1M), is affected on Solaris 2.6, 7, 8. \n     Sun  is  currently  generating  patches  for this issue and will be\n     releasing  a  Sun Security Bulletin once the patches are available. \n     The bulletin will be available from:\n     http://sunsolve.sun.com/security.  Sun  patches are available from:\n     http://sunsolve.sun.com/securitypatch. \n\nSymantec Corporation\n\n     Symantec Corporation has investigated the SNMP issues identified by\n     the  OUSPG test suite and determined that Symantec products are not\n     susceptable [sic] to these issues. \n\nTANDBERG\n\n     Tandberg  have  run  all  the  testcases found the PROTOS test-suie\n     [sic], c06snmpv1:\n     1. c06-snmpv1-trap-enc-pr1.jar\n     2. c06-snmpv1-treq-app-pr1.jar\n     3. c06-snmpv1-trap-enc-pr1.jar\n     4. c06-snmpv1-req-app-pr1.jar\n     The  tests  were  run with standard delay time between the requests\n     (100ms),  but  also  with  a delay of 1ms. The tests applies to all\n     TANDBERG  products (T500, T880, T1000, T2500, T6000 and T8000). The\n     software  tested  on these products were B4.0 (our latest software)\n     and no problems were found when running the test suite. \n\nAppendix B. - References\n         1. http://www.ee.oulu.fi/research/ouspg/protos/\n         2. http://www.kb.cert.org/vuls/id/854306\n         3. http://www.kb.cert.org/vuls/id/107186\n         4. http://www.cert.org/tech_tips/denial_of_service.html\n         5. http://www.ietf.org/rfc/rfc1067.txt\n         6. http://www.ietf.org/rfc/rfc1089.txt\n         7. http://www.ietf.org/rfc/rfc1140.txt\n         8. http://www.ietf.org/rfc/rfc1155.txt\n         9. http://www.ietf.org/rfc/rfc1156.txt\n        10. http://www.ietf.org/rfc/rfc1215.txt\n        11. http://www.ietf.org/rfc/rfc1270.txt\n        12. http://www.ietf.org/rfc/rfc1352.txt\n\nAppendix C. - Background Information\n\n     Background Information on the OUSPG\n\n       OUSPG  is an academic research group located at Oulu University in\n       Finland.  The  purpose  of this research group is to test software\n       for vulnerabilities. \n       History  has  shown  that  the  techniques  used by the OUSPG have\n       discovered a large number of previously undetected problems in the\n       products  and  protocols  they  have  tested.  In  2001, the OUSPG\n       produced a comprehensive test suite for evaluating implementations\n       of  the  Lightweight  Directory  Access Protocol (LDAP). This test\n       suite  was  developed with the strategy of abusing the protocol in\n       unsupported  and  unexpected  ways,  and  it was very effective in\n       uncovering  a  wide  variety  of  vulnerabilities  across  several\n       products.  This approach can reveal vulnerabilities that would not\n       manifest themselves under normal conditions. \n       After  completing  its  work  on  LDAP,  OUSPG  moved its focus to\n       SNMPv1.  As  with  LDAP,  they designed a custom test suite, began\n       testing   a   selection   of  products,  and  found  a  number  of\n       vulnerabilities.  Because  OUSPG\u0027s  work  on  LDAP  was similar in\n       procedure  to its current work on SNMP, you may wish to review the\n       LDAP  Test  Suite  and  CERT  Advisory  CA-2001-18, which outlined\n       results of application of the test suite. \n       In order to test the security of protocols like SNMPv1, the PROTOS\n       project  presents  a  server with a wide variety of sample packets\n       containing  unexpected  values  or  illegally formatted data. As a\n       member of the PROTOS project consortium, the OUSPG used the PROTOS\n       c06-snmpv1  test  suite  to  study  several implementations of the\n       SNMPv1  protocol. Software and\n       firmware products designed for networks often make use of the SNMP\n       protocol.  SNMP  runs  on  a  multitude  of  devices and operating\n       systems, including, but not limited to,\n          + Core  Network  Devices (Routers, Switches, Hubs, Bridges, and\n            Wireless Network Access Points)\n          + Operating Systems\n          + Consumer  Broadband  Network  Devices  (Cable  Modems and DSL\n            Modems)\n          + Consumer Electronic Devices (Cameras and Image Scanners)\n          + Networked   Office  Equipment  (Printers,  Copiers,  and  FAX\n            Machines)\n          + Network and Systems Management/Diagnostic Frameworks (Network\n            Sniffers and Network Analyzers)\n          + Uninterruptible Power Supplies (UPS)\n          + Networked Medical Equipment (Imaging Units and Oscilloscopes)\n          + Manufacturing and Processing Equipment\n       The  SNMP  protocol  is  formally defined in RFC1157. Quoting from\n       that RFC:\n\n                Implicit  in the SNMP architectural model is a collection\n                of  network  management  stations  and  network elements. \n                Network    management    stations    execute   management\n                applications  which monitor and control network elements. \n                Network  elements  are  devices  such as hosts, gateways,\n                terminal  servers,  and  the  like, which have management\n                agents  responsible for performing the network management\n                functions  requested  by the network management stations. \n\n       Additionally,   SNMP  is  discussed  in  a  number  of  other  RFC\n       documents:\n          + RFC 3000 Internet Official Protocol Standards\n          + RFC 1212 Concise MIB Definitions\n          + RFC  1213  Management Information Base for Network Management\n            of TCP/IP-based Internets: MIB-II\n          + RFC  1215  A  Convention  for Defining Traps for use with the\n            SNMP\n          + RFC 1270 SNMP Communications Services\n          + RFC  2570  Introduction to Version 3 of the Internet-standard\n            Network Management Framework\n          + RFC  2571  An  Architecture  for  Describing  SNMP Management\n            Frameworks\n          + RFC  2572  Message  Processing and Dispatching for the Simple\n            Network Management Protocol (SNMP)\n          + RFC 2573 SNMP Applications\n          + RFC 2574 User-based Security Model (USM) for version 3 of the\n            Simple Network Management Protocol (SNMPv3)\n          + RFC  2575  View-based  Access  Control  Model  (VACM) for the\n            Simple Network Management Protocol (SNMP)\n          + RFC  2576  Coexistence  between  Version  1,  Version  2, and\n            Version   3   of  the  Internet-standard  Network  Management\n            Framework\n         _____________________________________________________________\n\n       The  CERT  Coordination  Center  thanks the Oulu University Secure\n       Programming  Group  for reporting these vulnerabilities to us, for\n       providing  detailed  technical  analyses,  and for assisting us in\n       preparing  this  advisory.  We also thank Steven M. Bellovin (AT\u0026T\n       Labs  --  Research),  Wes Hardaker (Net-SNMP), Steve Moulton (SNMP\n       Research),  Tom Reddington (Bell Labs), Mike Duckett (Bell South),\n       Rob   Thomas,  Blue  Boar  (Thievco),  and  the  many  others  who\n       contributed to this document. \n         _____________________________________________________________\n\n       Feedback  on  this document can be directed to the authors, Ian A. \n       Finlay, Shawn V. Hernan, Jason A. Rafail, Chad Dougherty, Allen D. \n       Householder, Marty Lindner, and Art Manion. \n       __________________________________________________________________\n\n       This document is available from:\n       http://www.cert.org/advisories/CA-2002-03.html\n       __________________________________________________________________\n\n       CERT/CC Contact Information\n\n        Email: cert@cert.org\n                Phone: +1 412-268-7090 (24-hour hotline)\n                Fax: +1 412-268-6989\n                Postal address:\n                CERT Coordination Center\n                Software Engineering Institute\n                Carnegie Mellon University\n                Pittsburgh PA 15213-3890\n                U.S.A. \n\n       CERT/CC  personnel  answer  the  hotline  08:00-17:00 EST(GMT-5) /\n       EDT(GMT-4) Monday through Friday; they are on call for emergencies\n       during other hours, on U.S. holidays, and on weekends. \n       \n       Using encryption\n       We  strongly  urge  you  to  encrypt sensitive information sent by\n       email. Our public PGP key is available from\n        http://www.cert.org/CERT_PGP.key\n       If  you  prefer  to use DES, please call the CERT hotline for more\n       information. \n       \n       Getting  security information\n       CERT publications and other security information are available\n       from our web site\n        http://www.cert.org/\n       To   subscribe  to  the  CERT  mailing  list  for  advisories  and\n       bulletins, send email to majordomo@cert.org. Please include in the\n       body of your message\n       \n         subscribe cert-advisory\n       \n       * \"CERT\" and \"CERT Coordination Center\" are registered in the U.S. \n       Patent and Trademark Office. \n       __________________________________________________________________\n\n       NO WARRANTY\n       Any  material  furnished  by  Carnegie  Mellon  University and the\n       Software  Engineering  Institute is furnished on an \"as is\" basis. \n       Carnegie Mellon University makes no warranties of any kind, either\n       expressed  or  implied as to any matter including, but not limited\n       to,   warranty   of   fitness   for   a   particular   purpose  or\n       merchantability,  exclusivity  or results obtained from use of the\n       material. Carnegie Mellon University does not make any warranty of\n       any  kind  with  respect  to  freedom  from  patent, trademark, or\n       copyright infringement. \n         _____________________________________________________________\n\n       Conditions for use, disclaimers, and sponsorship information\n       Copyright 2002 Carnegie Mellon University. \n\nRevision History\n\n       February 12, 2002: Initial release\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 6.5.8\n\niQCVAwUBPGltxKCVPMXQI2HJAQGVeAQAuHtxGBsmU5HI6PtqhpZ1rkpV+Cq3ChIU\nR1FUz4Zi2vzklH8jdXd10KqwZAPhXTPazeguhRyLVSUprMlSKqcXg3BCkH/y4WAl\nQUZ1VnQXMnMrxIJO1fv0WW0pcyM4W0iQBl0kCIlawPcjCGVniOCOr+4CE0f923wr\nuZiMJ5f2SEo=\n=h42e\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      }
    ],
    "trust": 4.59
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=21296",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#854306",
        "trust": 4.0
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "4132",
        "trust": 1.9
      },
      {
        "db": "BID",
        "id": "4732",
        "trust": 1.9
      },
      {
        "db": "BID",
        "id": "4089",
        "trust": 1.9
      },
      {
        "db": "BID",
        "id": "4088",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#107186",
        "trust": 1.5
      },
      {
        "db": "XF",
        "id": "8176",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034",
        "trust": 0.8
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:87",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:298",
        "trust": 0.6
      },
      {
        "db": "ISS",
        "id": "20020212 PROTOS REMOTE SNMP ATTACK TOOL",
        "trust": 0.6
      },
      {
        "db": "MS",
        "id": "MS02-006",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2001:163",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "57404",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2002-03",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20020201-01-A",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "89608",
        "trust": 0.3
      },
      {
        "db": "BID",
        "id": "89661",
        "trust": 0.3
      },
      {
        "db": "EXPLOIT-DB",
        "id": "21296",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "25758",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "id": "VAR-200202-0007",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.42828385666666663
  },
  "last_update_date": "2023-12-18T12:47:42.158000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00184",
        "trust": 0.8,
        "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00964944"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      },
      {
        "title": "MS02-006",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.mspx"
      },
      {
        "title": "RHSA-2001:163",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2001-163.html"
      },
      {
        "title": "#00215",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-1"
      },
      {
        "title": "#00215",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-3"
      },
      {
        "title": "MS02-006",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms02-006.mspx"
      },
      {
        "title": "RHSA-2001:163",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2001-163j.html"
      },
      {
        "title": "Cisco: Malformed SNMP Message-Handling Vulnerabilities for Cisco Non-IOS Products",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20020211-snmp-msgs-non-ios"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "http://www.cert.org/advisories/ca-2002-03.html"
      },
      {
        "trust": 3.3,
        "url": "http://www.kb.cert.org/vuls/id/854306"
      },
      {
        "trust": 2.3,
        "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2001-163.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.ee.oulu.fi/research/ouspg/protos/"
      },
      {
        "trust": 1.7,
        "url": "http://www.cert.org/tech_tips/denial_of_service.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.ietf.org/rfc/rfc1215.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.ietf.org/rfc/rfc1270.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/alerts/advise110.php"
      },
      {
        "trust": 1.7,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-a"
      },
      {
        "trust": 1.7,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57404-1"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc3000.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc1212.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc1213.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2570.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2571.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2572.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2573.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2574.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2575.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2576.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/4088"
      },
      {
        "trust": 1.6,
        "url": "http://online.securityfocus.com/bid/4132"
      },
      {
        "trust": 1.6,
        "url": "http://online.securityfocus.com/bid/4732"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/4089"
      },
      {
        "trust": 1.4,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0013"
      },
      {
        "trust": 1.2,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.asp"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a87"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a298"
      },
      {
        "trust": 1.1,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/m-042.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20020213snmp.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2002/wr020701.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2002/wr020901.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2002/at020001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2002-03"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0013"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/8176"
      },
      {
        "trust": 0.7,
        "url": "http://www.kb.cert.org/vuls/id/107186"
      },
      {
        "trust": 0.6,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0012"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:87"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:298"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f44605"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f42769"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f43365"
      },
      {
        "trust": 0.3,
        "url": "http://online.securityfocus.com/news/474"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-006.asp"
      },
      {
        "trust": 0.3,
        "url": "http://otn.oracle.com/deploy/security/pdf/snmp_2002_alert.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f46343"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-malformed-snmp-msgs-non-ios-pub.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/public/sw-center/sw-ios.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-malformed-snmp-msgs-pub.shtml"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/264.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/21296/"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20020211-snmp-msgs-non-ios"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1352.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/tech_tips/snmp_faq.html"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/4.1.02/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://www.innerdive.com/products/ric/)"
      },
      {
        "trust": 0.1,
        "url": "https://www.juniper.net."
      },
      {
        "trust": 0.1,
        "url": "http://sunsolve.sun.com/securitypatch."
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/go/psirt/."
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/4.0.15/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1067.txt"
      },
      {
        "trust": 0.1,
        "url": "https://www.dartware.com)"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1140.txt"
      },
      {
        "trust": 0.1,
        "url": "http://itrc.hp.com"
      },
      {
        "trust": 0.1,
        "url": "http://www.sun.com/solstice/products/ent.agents/"
      },
      {
        "trust": 0.1,
        "url": "http://stage.caldera.com/support/security"
      },
      {
        "trust": 0.1,
        "url": "http://www.ee.oulu.fi/research/ouspg/)"
      },
      {
        "trust": 0.1,
        "url": "http://www.net-snmp.org/download/)."
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/cert_pgp.key"
      },
      {
        "trust": 0.1,
        "url": "http://www.ibm.com/software/lotus/support/)."
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/sa/4.0.15/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1156.txt"
      },
      {
        "trust": 0.1,
        "url": "http://support.novell.com/tools/csp/"
      },
      {
        "trust": 0.1,
        "url": "http://support.openview.hp.com/cpe/patches/"
      },
      {
        "trust": 0.1,
        "url": "https://www.covalent.net"
      },
      {
        "trust": 0.1,
        "url": "http://www.innerdive.com/products/mibscout/)"
      },
      {
        "trust": 0.1,
        "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/0100.h"
      },
      {
        "trust": 0.1,
        "url": "http://sunsolve.sun.com/security."
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1155.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.stonesoft.com/support/techcenter/"
      },
      {
        "trust": 0.1,
        "url": "http://www.sgi.com/support/security/."
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1089.txt"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/3.1.22/relnotes.htm"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-01-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "date": "2002-02-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "date": "2002-03-08T00:00:00",
        "db": "BID",
        "id": "89608"
      },
      {
        "date": "2002-03-08T00:00:00",
        "db": "BID",
        "id": "89661"
      },
      {
        "date": "2002-05-13T00:00:00",
        "db": "BID",
        "id": "4732"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4089"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4132"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "date": "2002-02-12T22:54:19",
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "date": "2002-02-13T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "date": "2002-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "date": "2007-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "date": "2018-10-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2002-0013"
      },
      {
        "date": "2002-03-08T00:00:00",
        "db": "BID",
        "id": "89608"
      },
      {
        "date": "2002-03-08T00:00:00",
        "db": "BID",
        "id": "89661"
      },
      {
        "date": "2002-05-13T00:00:00",
        "db": "BID",
        "id": "4732"
      },
      {
        "date": "2009-07-11T10:56:00",
        "db": "BID",
        "id": "4089"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4132"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000034"
      },
      {
        "date": "2018-10-12T21:30:48.157000",
        "db": "NVD",
        "id": "CVE-2002-0013"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200202-004"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      }
    ],
    "trust": 1.5
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vulnerabilities in SNMPv1 trap handling",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Input Validation Error",
    "sources": [
      {
        "db": "BID",
        "id": "89608"
      },
      {
        "db": "BID",
        "id": "89661"
      }
    ],
    "trust": 0.6
  }
}

var-200205-0149
Vulnerability from variot

Buffer overflow in sar for OpenServer 5.0.5 allows local users to gain root privileges via a long -o parameter. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. The resultant crash may be due to a buffer overflow condition. If this is the case, attackers may be able to exploit this vulnerability to execute arbitrary code. SNMP requests are messages sent from manager to agent systems. They typically poll the agent for current performance or configuration information, ask for the next SNMP object in a Management Information Base (MIB), or modify the configuration settings of the agent. Multiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP request messages. Among the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. A general report for multiple vendors was initially published on February 12 (Bugtraq IDs 4088 and 4089), however more information is now available and a separate Bugtraq ID has been allocated for the Cisco Operating Systems and Appliances vulnerabilities. It is reportedly possible for a remote attacker to create a denial of service condition by transmitting a malformed SNMP request to a vulnerable Cisco Operating System or Appliance. The affected device may reset, or require a manual reset to regain functionality.

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-03: Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)

Original release date: February 12, 2002 Last revised: -- Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

Products from a very wide variety of vendors may be affected. See Vendor Information for details from vendors who have provided feedback for this advisory.

In addition to the vendors who provided feedback for this advisory, a list of vendors whom CERT/CC contacted regarding these problems is available from http://www.kb.cert.org/vuls/id/854306 http://www.kb.cert.org/vuls/id/107186

Many other systems making use of SNMP may also be vulnerable but were not specifically tested.

In addition to this advisory, we also have an FAQ available at http://www.cert.org/tech_tips/snmp_faq.html

I. Description

The Simple Network Management Protocol (SNMP) is a widely deployed protocol that is commonly used to monitor and manage network devices. Version 1 of the protocol (SNMPv1) defines several types of SNMP messages that are used to request information or configuration changes, respond to requests, enumerate SNMP objects, and send unsolicited alerts. The Oulu University Secure Programming Group (OUSPG, http://www.ee.oulu.fi/research/ouspg/) has reported numerous vulnerabilities in SNMPv1 implementations from many different vendors. More information about SNMP and OUSPG can be found in Appendix C

OUSPG's research focused on the manner in which SNMPv1 agents and managers handle request and trap messages. A trap message may indicate a warning or error condition or otherwise notify the manager about the agent's state. Request messages might be issued to obtain information from an agent or to instruct the agent to configure the host device.

Vulnerabilities in the decoding and subsequent processing of SNMP messages by both managers and agents may result in denial-of-service conditions, format string vulnerabilities, and buffer overflows. Some vulnerabilities do not require the SNMP message to use the correct SNMP community string.

These vulnerabilities have been assigned the CVE identifiers CAN-2002-0012 and CAN-2002-0013, respectively.

II.

III. Solution

Note that many of the mitigation steps recommended below may have significant impact on your everyday network operations and/or network architecture. Ensure that any changes made based on the following recommendations will not unacceptably affect your ongoing network operations capability.

Apply a patch from your vendor

Appendix A contains information provided by vendors for this advisory. Please consult this appendix to determine if you need to contact your vendor directly.

Disable the SNMP service

As a general rule, the CERT/CC recommends disabling any service or capability that is not explicitly required, including SNMP. Unfortunately, some of the affected products exhibited unexpected behavior or denial of service conditions when exposed to the OUSPG test suite even if SNMP was not enabled. In these cases, disabling SNMP should be used in conjunction with the filtering practices listed below to provide additional protection.

Ingress filtering

As a temporary measure, it may be possible to limit the scope of these vulnerabilities by blocking access to SNMP services at the network perimeter.

Ingress filtering manages the flow of traffic as it enters a network under your administrative control. Servers are typically the only machines that need to accept inbound traffic from the public Internet. In the network usage policy of many sites, there are few reasons for external hosts to initiate inbound traffic to machines that provide no public services. Thus, ingress filtering should be performed at the border to prohibit externally initiated inbound traffic to non-authorized services. For SNMP, ingress filtering of the following ports can prevent attackers outside of your network from impacting vulnerable devices in the local network that are not explicitly authorized to provide public SNMP services.

snmp 161/udp # Simple Network Management Protocol (SNMP) snmp 162/udp # SNMP system management messages

The following services are less common, but may be used on some affected products

snmp 161/tcp # Simple Network Management Protocol (SNMP) snmp 162/tcp # SNMP system management messages smux 199/tcp # SNMP Unix Multiplexer smux 199/udp # SNMP Unix Multiplexer synoptics-relay 391/tcp # SynOptics SNMP Relay Port synoptics-relay 391/udp # SynOptics SNMP Relay Port agentx 705/tcp # AgentX snmp-tcp-port 1993/tcp # cisco SNMP TCP port snmp-tcp-port 1993/udp # cisco SNMP TCP port

As noted above, you should carefully consider the impact of blocking services that you may be using.

It is important to note that in many SNMP implementations, the SNMP daemon may bind to all IP interfaces on the device. This has important consequences when considering appropriate packet filtering measures required to protect an SNMP-enabled device. For example, even if a device disallows SNMP packets directed to the IP addresses of its normal network interfaces, it may still be possible to exploit these vulnerabilities on that device through the use of packets directed at the following IP addresses: * "all-ones" broadcast address * subnet broadcast address * any internal loopback addresses (commonly used in routers for management purposes, not to be confused with the IP stack loopback address 127.0.0.1)

Careful consideration should be given to addresses of the types mentioned above by sites planning for packet filtering as part of their mitigation strategy for these vulnerabilities.

Finally, sites may wish to block access to the following RPC services related to SNMP (listed as name, program ID, alternate names)

snmp 100122 na.snmp snmp-cmc snmp-synoptics snmp-unisys snmp-utk snmpv2 100138 na.snmpv2 # SNM Version 2.2.2 snmpXdmid 100249

Please note that this workaround may not protect vulnerable devices from internal attacks.

Filter SNMP traffic from non-authorized internal hosts

In many networks, only a limited number of network management systems need to originate SNMP request messages. This can reduce, but not wholly eliminate, the risk from internal attacks. However, it may have detrimental effects on network performance due to the increased load imposed by the filtering, so careful consideration is required before implementation. Similar caveats to the previous workaround regarding broadcast and loopback addresses apply.

Change default community strings

Most SNMP-enabled products ship with default community strings of "public" for read-only access and "private" for read-write access. As with any known default access control mechanism, the CERT/CC recommends that network administrators change these community strings to something of their own choosing. However, even when community strings are changed from their defaults, they will still be passed in plaintext and are therefore subject to packet sniffing attacks. SNMPv3 offers additional capabilities to ensure authentication and privacy as described in RFC2574.

Because many of the vulnerabilities identified in this advisory occur before the community strings are evaluated, it is important to note that performing this step alone is not sufficient to mitigate the impact of these vulnerabilities. Nonetheless, it should be performed as part of good security practice.

Segregate SNMP traffic onto a separate management network

In situations where blocking or disabling SNMP is not possible, exposure to these vulnerabilities may be limited by restricting all SNMP access to separate, isolated management networks that are not publicly accessible. Although this would ideally involve physically separate networks, that kind of separation is probably not feasible in most environments. Mechanisms such as virtual LANs (VLANs) may be used to help segregate traffic on the same physical network. Note that VLANs may not strictly prevent an attacker from exploiting these vulnerabilities, but they may make it more difficult to initiate the attacks.

Another option is for sites to restrict SNMP traffic to separate virtual private networks (VPNs), which employ cryptographically strong authentication.

Note that these solutions may require extensive changes to a site's network architecture.

Egress filtering

Egress filtering manages the flow of traffic as it leaves a network under your administrative control. There is typically limited need for machines providing public services to initiate outbound traffic to the Internet. In the case of SNMP vulnerabilities, employing egress filtering on the ports listed above at your network border can prevent your network from being used as a source for attacks on other sites.

Disable stack execution

Disabling executable stacks (on systems where this is configurable) can reduce the risk of "stack smashing" attacks based on these vulnerabilities. Although this does not provide 100 percent protection against exploitation of these vulnerabilities, it makes the likelihood of a successful exploit much smaller. On many UNIX systems, executable stacks can be disabled by adding the following lines to /etc/system:

set noexec_user_stack = 1 set noexec_user_stack_log = 1

Note that this may go against the SPARC and Intel ABIs and can be bypassed as required in programs with mprotect(2). For the changes to take effect you will then need to reboot.

Other operating systems and architectures also support the disabling of executable stacks either through native configuration parameters or via third-party software. Consult your vendor(s) for additional information.

Share tools and techniques

Because dealing with these vulnerabilities to systems and networks is so complex, the CERT/CC will provide a forum where administrators can share ideas and techniques that can be used to develop proper defenses. We have created an unmoderated mailing list for system and network administrators to discuss helpful techniques and tools.

You can subscribe to the mailing list by sending an email message to majordomo@cert.org. In the body of the message, type

subscribe snmp-forum

After you receive the confirmation message, follow the instructions in the message to complete the subscription process.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this advisory. As vendors report new information to the CERT/CC, we will update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.

AdventNet

 This  is in reference to your notification regarding [VU#107186 and
 VU#854306]  and  OUSPG#0100.   AdventNet  Inc.  has reproduced this
 behavior  in  their  products and coded a Service Pack fix which is
 currently   in   regression   testing   in  AdventNet  Inc.'s  Q.A. 
 organization.    The  release  of  AdventNet  Inc's.  Service  Pack
 correcting  the  behavior  outlined in VU#617947, and OUSPG#0100 is
 scheduled  to  be  generally  available  to all of AdventNet Inc.'s
 customers by February 20, 2002.

Avaya

 Avaya  Inc. No further information is available at this time.

CacheFlow

 The  purpose of this email is to advise you that CacheFlow Inc. has
 provided a software update. Please be advised that updated versions
 of  the  software  are  now  available  for all supported CacheFlow
 hardware  platforms,  and may be obtained by CacheFlow customers at
 the following URL:

      http://download.cacheflow.com/

The specific reference to the software update is contained within the Release Notes for CacheOS Versions 3.1.22 Release ID 17146, 4.0.15 Release ID 17148, 4.1.02 Release ID 17144 and 4.0.15 Release ID 17149.

RELEASE NOTES FOR CACHEFLOW SERVER ACCELERATOR PRODUCTS: * http://download.cacheflow.com/release/SA/4.0.15/relnotes.htm

RELEASE NOTES FOR CACHEFLOW CONTENT ACCELERATOR PRODUCTS: * http://download.cacheflow.com/release/CA/3.1.22/relnotes.htm * http://download.cacheflow.com/release/CA/4.0.15/relnotes.htm * http://download.cacheflow.com/release/CA/4.1.02/relnotes.htm

 * SR   1-1647517,   VI  13045:  This  update  modified  a  potential
 vulnerability by using an SNMP test tools exploit.

3Com Corporation

 A  vulnerability to an SNMP packet with an invalid length community
 string  has  been  resolved  in  the  following products. Customers
 concerned  about  this  weakness should ensure that they upgrade to
 the following agent versions:
 PS Hub 40
 2.16 is due Feb 2002
 PS Hub 50
 2.16 is due Feb 2002
 Dual Speed Hub
 2.16 is due Jan 2002
 Switch 1100/3300
 2.68 is available now
 Switch 4400
 2.02 is available now
 Switch 4900
 2.04 is available now
 WebCache1000/3000
 2.00 is due Jan 2002

Caldera

 Caldera   International,  Inc.  has  reproduced  faulty behavior in
 Caldera SCO OpenServer 5, Caldera UnixWare 7, and Caldera Open UNIX
 8.  We have coded a software fix for  supported versions of Caldera
 UnixWare  7  and  Caldera  Open UNIX 8 that will  be available from
 our   support   site  at  http://stage.caldera.com/support/security
 immediately  following the publication of this CERT announcement. A
 fix  for  supported versions of OpenServer 5 will be available at a
 later date.

Cisco Systems

 Cisco  Systems  is  addressing  the  vulnerabilities  identified by
 VU#854306  and VU#107186 across its entire product line. Cisco will
 publish    a    security   advisory   with   further   details   at
 http://www.cisco.com/go/psirt/.

Compaq Computer Corporation

 x-ref: SSRT0779U SNMP
 At  the time of writing this document, COMPAQ continues to evaluate
 this potential problem and when new versions of SNMP are available,
 COMPAQ  will implement solutions based on the new code. Compaq will
 provide  notice  of  any  new  patches  as  a result of that effort
 through  standard  patch  notification  procedures and be available
 from your normal Compaq Services support channel.

Computer Associates

 Computer  Associates  has  confirmed Unicenter vulnerability to the
 SNMP  advisory identified by CERT notification reference [VU#107186
 &   VU#854306]   and   OUSPG#0100.   We  have  produced  corrective
 maintenance  to  address  these  vulnerabilities,  which  is in the
 process  of publication for all applicable releases / platforms and
 will  be  offered  through the CA Support site.  Please contact our
 Technical    Support   organization   for   information   regarding
 availability / applicability for your specific configuration(s).

COMTEK Services, Inc.

 NMServer  for  AS/400  is  not  an SNMP master and is therefore not
 vulnerable.  However  this  product  requires the use of the AS/400
 SNMP  master  agent  supplied  by  IBM.

 NMServer   for  OpenVMS  has  been  tested  and  has  shown  to  be
 vulnerable.  COMTEK  Services  is  preparing  a new release of this
 product  (version  3.5)  which will contain a fix for this problem. 
 This  new  release  is  scheduled to be available in February 2002. 
 Contact COMTEK Services for further information.

 NMServer  for VOS has not as yet been tested; vulnerability of this
 agent  is  unknown.  Contact for further information on the testing
 schedule of the VOS product.

Covalent Technologies

 Covalent Technologies ERS (Enterprise Ready Server), Secure Server,
 and  Conductor  SNMP module are not vulnerable according to testing
 performed   in   accordance  with  CERT  recommendations.  Security
 information for Covalent products can be found at www.covalent.net

Dartware, LLC

 Dartware,  LLC  (www.dartware.com)  supplies  two products that use
 SNMPv1  in  a  manager  role,  InterMapper  and SNMP Watcher.  This statement applies to all present
 and past versions of these two software packages.

DMH Software

 DMH  Software  is  in  the  process of evaluating and attempting to
 reproduce this behavior. 
 It  is  unclear at this point if our snmp-agent is sensitive to the
 tests described above. 
 If  any  problems  will  be  discovered,  DMH  Software will code a
 software fix. 
 The  release of DMH Software OS correcting the behavior outlined in
 VU#854306, VU#107186, and OUSPG#0100 will be generally available to
 all of DMH Software's customers as soon as possible.

EnGarde Secure Linux

 EnGarde  Secure  Linux  did  not  ship any SNMP packages in version
 1.0.1 of our distribution, so we are not vulnerable to either bug.

FreeBSD

 FreeBSD  does  not  include any SNMP software by default, and so is
 not vulnerable.  However, the FreeBSD Ports Collection contains the
 UCD-SNMP   /   NET-SNMP   package.    Package   versions  prior  to
 ucd-snmp-4.2.3  are  vulnerable.   The upcoming FreeBSD 4.5 release
 will  ship  the  corrected  version  of  the  UCD-SNMP  /  NET-SNMP
 package.   In  addition,  the  corrected version of the packages is
 available from the FreeBSD mirrors.

 FreeBSD   has   issued  the  following  FreeBSD  Security  Advisory
 regarding the UCD-SNMP / NET-SNMP package:
 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:09. 
 snmp.asc.

Hewlett-Packard Company

 SUMMARY - known vulnerable:
 ========================================
 hp procurve switch 2524
 NNM  (Network Node Manager)
 JetDirect Firmware (Older versions only)
 HP-UX Systems running snmpd or OPENVIEW
 MC/ServiceGuard
 EMS
 Still under investigation:
 SNMP/iX (MPE/iX)
 ========================================
 _________________________________________________________
 ---------------------------------------------------------
 hp procurve switch 2524 
 ---------------------------------------------------------
 hp procurve switch 2525 (product J4813A) is vulnerable to some
 issues, patches in process. Watch for the associated HP
 Security Bulletin. 
 ---------------------------------------------------------
 NNM  (Network Node Manager)
 ---------------------------------------------------------
 Some problems were found in NNM product were related to
 trap handling. Patches in process. Watch for the
 associated HP Security Bulletin. 
 ---------------------------------------------------------
 JetDirect Firmware (Older versions only)
 ---------------------------------------------------------
 ONLY some older versions of JetDirect Firmware are
 vulnerable to some of the issues.  The older firmware
 can be upgraded in most cases, see list below. 
 JetDirect Firmware Version    State
 ==========================    =====
    X.08.32 and higher     NOT Vulnerable
    X.21.00 and higher     NOT Vulnerable
 JetDirect Product Numbers that can be freely
 upgraded to X.08.32 or X.21.00 or higher firmware. 
 EIO (Peripherals Laserjet 4000, 5000, 8000, etc...)
 J3110A 10T
 J3111A 10T/10B2/LocalTalk
 J3112A Token Ring (discontinued)
 J3113A 10/100 (discontinued)
 J4169A 10/100
 J4167A Token Ring
 MIO (Peripherals LaserJet 4, 4si, 5si, etc...)
 J2550A/B 10T (discontinued)
 J2552A/B 10T/10Base2/LocalTalk (discontinued)
 J2555A/B Token Ring (discontinued)
 J4100A 10/100
 J4105A Token Ring
 J4106A 10T
 External Print Servers
 J2591A EX+ (discontinued)
 J2593A EX+3 10T/10B2 (discontinued)
 J2594A EX+3 Token Ring (discontinued)
 J3263A 300X 10/100
 J3264A 500X Token Ring
 J3265A 500X 10/100
 ----------------------------------------------------------
 HP-UX Systems running snmpd or OPENVIEW
 ----------------------------------------------------------
 The following patches are available now:
   PHSS_26137 s700_800 10.20 OV EMANATE14.2 Agent Consolidated Patch
   PHSS_26138 s700_800 11.X  OV EMANATE14.2 Agent Consolidated Patch
   PSOV_03087 EMANATE Release 14.2 Solaris 2.X  Agent Consolidated
 Patch
 All three patches are available from:
 http://support.openview.hp.com/cpe/patches/
 In addition PHSS_26137 and PHSS_26138 will soon be available from:
 http://itrc.hp.com
 ================================================================
 NOTE: The patches are labeled OV(Open View). However, the patches
 are also applicable to systems that are not running Open View. 
 =================================================================
 Any   HP-UX  10.X  or  11.X  system  running  snmpd  or  snmpdm  is
 vulnerable. 
 To determine if your HP-UX system has snmpd or snmpdm installed:
   swlist -l file | grep snmpd
 If a patch is not available for your platform or you cannot install
 an  available  patch,  snmpd and snmpdm can be disabled by removing
 their
 entries  from  /etc/services  and  removing the execute permissions
 from
 /usr/sbin/snmpd and /usr/sbin/snmpdm. 
 ----------------------------------------------------------------
 Investigation completed, systems vulnerable. 
 ----------------------------------------------------------------
 MC/ServiceGuard
 Event Monitoring System  (EMS)
 ----------------------------------------------------------------
   Still under investigation:
 ----------------------------------------------------------------
 SNMP/iX (MPE/iX)

Hirschmann Electronics GmbH & Co. KG

 Hirschmann  Electronics  GmbH  &  Co.  KG supplies a broad range of
 networking  products,  some  of  which  are  affected  by  the SNMP
 vulnerabilities  identified by CERT Coordination Center. Hirschmann customers may contact our Competence
 Center (phone +49-7127-14-1538, email:
 ans-support@nt.hirschmann.de)     for    additional    information,
 especially  regarding  availability  of  latest  firmware  releases
 addressing the SNMP vulnerabilities.

IBM Corporation

 Based  upon  the  results  of  running  the  test  suites  we  have
 determined  that  our  version  of  SNMP  shipped  with  AIX is NOT
 vulnerable.

Innerdive Solutions, LLC

 Innerdive Solutions, LLC has two SNMP based products:
 1. The "SNMP MIB Scout"
 (http://www.innerdive.com/products/mibscout/)
 2. The "Router IP Console" (http://www.innerdive.com/products/ric/)
 The "SNMP MIB Scout" is not vulnerable to either bug. 
 The "Router IP Console" releases prior to 3.3.0.407 are vulnerable. 
 The release of "Router IP Console" correcting the behavior outlined
 in  OUSPG#0100  is  3.3.0.407 and is already available on our site. 
 Also,  we  will  notify all our customers about this new release no
 later than March 5, 2002.

Juniper Networks

 This  is  in reference to your notification regarding CAN-2002-0012
 and  CAN-2002-0013.   Juniper Networks has reproduced this behavior
 and coded a software fix.  The fix will be included in all releases
 of  JUNOS Internet software built after January 5, 2002.  Customers
 with  current  support contracts can download new software with the
 fix from Juniper's web site at www.juniper.net. 
 Note: The behavior described in CAN-2002-0012 and CAN-2002-0013 can
 only  be  reproduced  in JUNOS Internet software if certain tracing
 options  are  enabled.   These options are generally not enabled in
 production routers.

Lantronix, Inc.

 Lantronix  is  committed  to  resolving  security  issues  with our
 products.  The SNMP security bug you reported has been fixed in LRS
 firmware version B1.3/611(020123).

Lotus Development Corporation

 Lotus    Software   evaluated   the   Lotus   Domino   Server   for
 vulnerabilities using the test suite materials provided by OUSPG. 
 This  problem  does  not affect default installations of the Domino
 Server.   However,  SNMP  agents  can  be  installed from the CD to
 provide  SNMP  services for the Domino Server (these are located in
 the   /apps/sysmgmt/agents   directory).    The  optional  platform
 specific  master  and  encapsulator  agents included with the Lotus
 Domino  SNMP  Agents  for  HP-UX  and Solaris have been found to be
 vulnerable.  For  those  platforms,  customers  should  upgrade  to
 version  R5.0.1  a  of  the Lotus Domino SNMP Agents, available for
 download  from the Lotus Knowledge Base on the IBM Support Web Site
 (http://www.ibm.com/software/lotus/support/).   Please   refer   to
 Document  #191059,  "Lotus Domino SNMP Agents R5.0.1a", also in the
 Lotus Knowledge Base, for more details.

LOGEC Systems Inc

 The  products  from  LOGEC  Systems are exposed to SNMP only via HP
 OpenView.  We  do  not have an implementation of SNMP ourselves. As
 such,  there is nothing in our products that would be an issue with
 this alert.

Lucent

 Lucent is aware of reports that there is a vulnerability in certain
 implementations  of  the  SNMP (Simple Network Management Protocol)
 code  that  is  used in data switches and other hardware throughout
 the telecom industry. 
 As soon as we were notified by CERT, we began assessing our product
 portfolio  and  notifying  customers  with  products  that might be
 affected. 
 Our  5ESS  switch  and  most  of  our  optical  portfolio  were not
 affected.   Our  core  and  edge  ATM switches and most of our edge
 access  products  are  affected, but we have developed, tested, and
 deployed  fixes for many of those products to our customers. 
 We consider the security and reliability of our customers' networks
 to  be  one  of  our  critical  measures  of success. We take every
 reasonable measure to ensure their satisfaction. 
 In  addition,  we  are  working  with  customers on ways to further
 enhance the security they have in place today.

Marconi

 Marconi  supplies  a  broad range of telecommunications and related
 products,  some  of  which are affected by the SNMP vulnerabilities
 identified  here. Those
 Marconi   customers   with  support  entitlement  may  contact  the
 appropriate   Technical  Assistance  Center  (TAC)  for  additional
 information.  Those not under support entitlement may contact their
 sales representative.

Microsoft Corporation

 The  Microsoft  Security Reponse [sic] Center has investigated this
 issue, and provides the following information.  The  SNMP v1 service is not installed or running by
 default on any version of Windows. A patch is underway to eliminate
 the  vulnerability.  In  the  meantime,  we recommend that affected
 customers disable the SNMP v1 service.

 Details:
 An  SNMP  v1 service ships on the CDs for Windows 95, 98, and 98SE. 
 It  is  not  installed  or  running  by  default  on  any  of these
 platforms.  An SNMP v1 is NOT provided for Windows ME.  However, it
 is  possible  that  Windows  98  machines  which  had  the  service
 installed  and  were  upgraded would still have the service.  Since
 SNMP  is  not  supported for WinME, customers in this situation are
 urged to remove the SNMP service. 
 An  SNMP  v1  service  is  available  on  Windows NT 4.0 (including
 Terminal  Server  Edition) and Windows 2000 but is not installed or
 running  by  default  on any of these platforms.Windows XP does not
 ship with an SNMP v1 service.

 Remediation:
 A  patch  is  underway  for  the  affected  platforms,  and will be
 released  shortly.  In  the  meantime,  Microsoft  recommends  that
 customers  who  have  the  SNMP  v1  service  running disable it to
 protect their systems. Following are instruction for doing this:

 Windows 95, 98 and 98SE:
 1. In Control Panel, double-click Network. 
 2. On  the  Configuration  tab,  select Microsoft SNMP Agent from the
    list of installed components. 
 3. Click Remove

 Check the following keys and confirm that snmp.exe is not listed. 
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunSer
 vices
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

 For Windows XP:
 1. Right-click on My Computer and select Manage
 2. Click on Services and Applications, then on Services
 3. Location  SNMP  on  the list of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click  OK  to  close  the  dialoge  [sic], then close the Computer
    Management window.

 For Windows NT 4.0 (including Terminal Server Edition):
 1. Select Start, then Settings. 
 2. Select Control Panel, then click on the Services Icon
 3. Locate  SNMP  on  the  list  of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click OK to close the dialoge [sic], then close Control Panel

 Windows 2000:
 1. Right-click on My Computer and select Manage
 2. Click on Services and Applications, then on Services
 3. Location  SNMP  on  the list of services, then select it and click
    Stop. 
 4. Select Startup, and click Disabled. 
 5. Click  OK  to  close  the  dialoge  [sic], then close the Computer
    Management window.

Multinet

 MultiNet  and  TCPware customers should contact Process Software to
 check  for  the availability of patches for this issue. A couple of
 minor  problems were found and fixed, but there is no security risk
 related to the SNMP code included with either product.

Netaphor

 NETAPHOR  SOFTWARE INC. is the creator of Cyberons for Java -- SNMP
 Manager  Toolkit  and Cyberons for Java -- NMS Application Toolkit,
 two   Java  based  products  that  may  be  affected  by  the  SNMP
 vulnerabilities  identified  here.  The  manner  in  which they are
 affected  and the actions required (if any) to avoid being impacted
 by  exploitation  of  these  vulnerabilities,  may  be  obtained by
 contacting  Netaphor  via email at info@netaphor.com Customers with
 annual support may contact support@netaphor.com directly. Those not
 under    support    entitlement   may   contact   Netaphor   sales:
 sales@netaphor.com or (949) 470 7955 in USA.

NetBSD

 NetBSD does not ship with any SNMP tools in our 'base' releases. We
 do  provide  optional  packages  which  provide various support for
 SNMP.  These  packages  are  not installed by default, nor are they
 currently  provided  as  an  install option by the operating system
 installation tools. A system administrator/end-user has to manually
 install this with our package management tools. These SNMP packages
 include:
      + netsaint-plugin-snmp-1.2.8.4  (SNMP  monitoring  plug-in  for
        netsaint)
      + p5-Net-SNMP-3.60 (perl5 module for SNMP queries)
      + p5-SNMP-3.1.0  (Perl5  module for interfacing to the UCD SNMP
        library
      + p5-SNMP_Session-0.83   (perl5  module  providing  rudimentary
        access to remote SNMP agents)
      + ucd-snmp-4.2.1  (Extensible  SNMP  implementation) (conflicts
        with ucd-snmp-4.1.2)
      + ucd-snmp-4.1.2  (Extensible  SNMP  implementation) (conflicts
        with ucd-snmp-4.2.1)

 We    do   provide   a   software   monitoring   mechanism   called
 'audit-packages',  which allows us to highlight if a package with a
 range  of  versions  has  a potential vulnerability, and recommends
 that the end-user upgrade the packages in question.

Netscape Communications Corporation

 Netscape  continues  to be committed to maintaining a high level of
 quality  in  our  software  and  service  offerings.  Part  of this
 commitment  includes  prompt response to security issues discovered
 by organizations such as the CERT Coordination Center. 
 According  to a recent CERT/CC advisory, The Oulu University Secure
 Programming  Group (OUSPG) has reported numerous vulnerabilities in
 multiple  vendor  SNMPv1 implementations. 
 We  have  carefully  examined the reported findings, performing the
 tests  suggested  by the OUSPG to determine whether Netscape server
 products  were  subject to these vulnerabilities. It was determined
 that several products fell into this category. As a result, we have
 created  fixes  which will resolve the issues, and these fixes will
 appear  in  future  releases  of  our  product  line. To Netscape's
 knowledge,  there  are  no known instances of these vulnerabilities
 being exploited and no customers have been affected to date. 
 When such security warnings are issued, Netscape has committed to -
 and will continue to commit to - resolving these issues in a prompt
 and timely fashion, ensuring that our customers receive products of
 the highest quality and security.

NET-SNMP

 All  ucd-snmp  version  prior  to  4.2.2  are  susceptible  to this
 vulnerability  and  users  of  versions  prior to version 4.2.2 are
 encouraged   to   upgrade   their  software  as  soon  as  possible
 (http://www.net-snmp.org/download/).  Version  4.2.2 and higher are
 not susceptible.

Network Associates

 PGP is not affected, impacted, or otherwise related to this VU#.

Network Computing Technologies

 Network   Computing   Technologies  has  reviewed  the  information
 regarding  SNMP  vulnerabilities and is currently investigating the
 impact to our products.

Nokia

 This  vulnerability  is  known  to affect IPSO versions 3.1.3, 3.3,
 3.3.1,  3.4,  and  3.4.1.   Patches  are  currently  available  for
 versions  3.3,  3.3.1,  3.4  and  3.4.1 for download from the Nokia
 website.   In  addition,  version  3.4.2  shipped  with  the  patch
 incorporated,  and the necessary fix will be included in all future
 releases of IPSO. 
 We  recommend customers install the patch immediately or follow the
 recommended precautions below to avoid any potential exploit. 
 If you are not using SNMP services, including Traps, simply disable
 the   SNMP   daemon   to   completely   eliminate   the   potential
 vulnerability. 
 If   you  are  using  only  SNMP  Traps  and  running  Check  Point
 FireWall-1,  create  a  firewall  policy  to disallow incoming SNMP
 messages on all appropriate interfaces. Traps will continue to work
 normally.

Nortel Networks

 The  CERT Coordination Center has issued a broad based alert to the
 technology industry, including Nortel Networks, regarding potential
 security   vulnerabilities   identified   in   the  Simple  Network
 Management  Protocol  (SNMP),  a  common  networking  standard. The
 company   is   working   with  CERT  and  other  network  equipment
 manufacturers, the U.S. Government, service providers, and software
 suppliers to assess and address this issue.

Novell

 Novell ships SNMP.NLM and SNMPLOG.NLM with NetWare 4.x, NetWare 5.x
 and  6.0  systems. The SNMP and SNMPLOG vulnerabilities detected on
 NetWare  are  fixed and will be available through NetWare 6 Support
 Pack 1 & NetWare 5.1 Support Pack 4. Support packs are available at
 http://support.novell.com/tools/csp/

OpenBSD

 OpenBSD does not ship SNMP code.

Qualcomm

 WorldMail  does  not  support SNMP by default, so customers who run
 unmodified installations are not vulnerable.

Redback Networks, Inc.

 Redback  Networks,  Inc.  has  identified that the vulnerability in
 question  affects  certain versions of AOS software on the SMS 500,
 SMS  1800,  and  SMS 10000 platforms, and is taking the appropriate
 steps necessary to correct the issue.

Red Hat

 RedHat has released a security advisiory [sic] at
 http://www.redhat.com/support/errata/RHSA-2001-163.html
 with  updated  versions  of  the ucd-snmp package for all supported
 releases and architectures. For more information or to download the
 update please visit this page.

SGI

 SGI  acknowledges  the SNMP vulnerabilities reported by CERT and is
 currently  investigating.  No  further  information is available at
 this time. 
 For  the  protection  of  all our customers, SGI does not disclose,
 discuss  or  confirm vulnerabilities until a full investigation has
 occurred  and  any  necessary  patch(es)  or  release  streams  are
 available  for all vulnerable and supported IRIX operating systems. 
 Until SGI has more definitive information to provide, customers are
 encouraged  to  assume  all security vulnerabilities as exploitable
 and  take  appropriate  steps  according  to  local  site  security
 policies   and   requirements.   As   further  information  becomes
 available,  additional advisories will be issued via the normal SGI
 security  information  distribution  methods  including the wiretap
 mailing list on http://www.sgi.com/support/security/.

SNMP Research International

 SNMP  Research  has  made  the following vendor statement. They are
 likely  to  revise  and  expand  the  statement as the date for the
 public vulnerability announcement draws nearer.   Users  maintaining
 earlier  releases should update to the current release if they have
 not  already  done  so.  Up-to-date  information  is available from
 support@snmp.com. Other Stonesoft's products are
 still   under   investigation.   As   further  information  becomes
 available, additional advisories will be available at
 http://www.stonesoft.com/support/techcenter/

Sun Microsystems, Inc.

 Sun's  SNMP  product,  Solstice  Enterprise Agents (SEA), described
 here:
 http://www.sun.com/solstice/products/ent.agents/
 is  affected  by VU#854306 but not VU#107186. More specifically the
 main  agent  of  SEA, snmpdx(1M), is affected on Solaris 2.6, 7, 8. 
 Sun  is  currently  generating  patches  for this issue and will be
 releasing  a  Sun Security Bulletin once the patches are available. 
 The bulletin will be available from:
 http://sunsolve.sun.com/security.  Sun  patches are available from:
 http://sunsolve.sun.com/securitypatch.

Symantec Corporation

 Symantec Corporation has investigated the SNMP issues identified by
 the  OUSPG test suite and determined that Symantec products are not
 susceptable [sic] to these issues.

TANDBERG

 Tandberg  have  run  all  the  testcases found the PROTOS test-suie
 [sic], c06snmpv1:
 1. c06-snmpv1-trap-enc-pr1.jar
 2. c06-snmpv1-treq-app-pr1.jar
 3. c06-snmpv1-trap-enc-pr1.jar
 4. c06-snmpv1-req-app-pr1.jar
 The  tests  were  run with standard delay time between the requests
 (100ms),  but  also  with  a delay of 1ms. The tests applies to all
 TANDBERG  products (T500, T880, T1000, T2500, T6000 and T8000). The
 software  tested  on these products were B4.0 (our latest software)
 and no problems were found when running the test suite.

Appendix B. - References 1. http://www.ee.oulu.fi/research/ouspg/protos/ 2. http://www.kb.cert.org/vuls/id/854306 3. http://www.kb.cert.org/vuls/id/107186 4. http://www.cert.org/tech_tips/denial_of_service.html 5. http://www.ietf.org/rfc/rfc1067.txt 6. http://www.ietf.org/rfc/rfc1089.txt 7. http://www.ietf.org/rfc/rfc1140.txt 8. http://www.ietf.org/rfc/rfc1155.txt 9. http://www.ietf.org/rfc/rfc1156.txt 10. http://www.ietf.org/rfc/rfc1215.txt 11. http://www.ietf.org/rfc/rfc1270.txt 12. http://www.ietf.org/rfc/rfc1352.txt

Appendix C. - Background Information

 Background Information on the OUSPG

   OUSPG  is an academic research group located at Oulu University in
   Finland.  The  purpose  of this research group is to test software
   for vulnerabilities. 
   History  has  shown  that  the  techniques  used by the OUSPG have
   discovered a large number of previously undetected problems in the
   products  and  protocols  they  have  tested.  In  2001, the OUSPG
   produced a comprehensive test suite for evaluating implementations
   of  the  Lightweight  Directory  Access Protocol (LDAP). This test
   suite  was  developed with the strategy of abusing the protocol in
   unsupported  and  unexpected  ways,  and  it was very effective in
   uncovering  a  wide  variety  of  vulnerabilities  across  several
   products.  This approach can reveal vulnerabilities that would not
   manifest themselves under normal conditions. 
   After  completing  its  work  on  LDAP,  OUSPG  moved its focus to
   SNMPv1.  As  with  LDAP,  they designed a custom test suite, began
   testing   a   selection   of  products,  and  found  a  number  of
   vulnerabilities.  Because  OUSPG's  work  on  LDAP  was similar in
   procedure  to its current work on SNMP, you may wish to review the
   LDAP  Test  Suite  and  CERT  Advisory  CA-2001-18, which outlined
   results of application of the test suite. 
   In order to test the security of protocols like SNMPv1, the PROTOS
   project  presents  a  server with a wide variety of sample packets
   containing  unexpected  values  or  illegally formatted data. As a
   member of the PROTOS project consortium, the OUSPG used the PROTOS
   c06-snmpv1  test  suite  to  study  several implementations of the
   SNMPv1  protocol.

 Background Information on the Simple Network Management Protocol

   The  Simple Network Management Protocol (SNMP) is the most popular
   protocol  in use to manage networked devices. SNMP was designed in
   the late 80's to facilitate the exchange of management information
   between  networked  devices, operating at the application layer of
   the  ISO/OSI  model.  The SNMP protocol enables network and system
   administrators  to  remotely  monitor and configure devices on the
   network  (devices  such  as  switches  and  routers). Software and
   firmware products designed for networks often make use of the SNMP
   protocol.  SNMP  runs  on  a  multitude  of  devices and operating
   systems, including, but not limited to,
      + Core  Network  Devices (Routers, Switches, Hubs, Bridges, and
        Wireless Network Access Points)
      + Operating Systems
      + Consumer  Broadband  Network  Devices  (Cable  Modems and DSL
        Modems)
      + Consumer Electronic Devices (Cameras and Image Scanners)
      + Networked   Office  Equipment  (Printers,  Copiers,  and  FAX
        Machines)
      + Network and Systems Management/Diagnostic Frameworks (Network
        Sniffers and Network Analyzers)
      + Uninterruptible Power Supplies (UPS)
      + Networked Medical Equipment (Imaging Units and Oscilloscopes)
      + Manufacturing and Processing Equipment
   The  SNMP  protocol  is  formally defined in RFC1157. Quoting from
   that RFC:

            Implicit  in the SNMP architectural model is a collection
            of  network  management  stations  and  network elements. 
            Network    management    stations    execute   management
            applications  which monitor and control network elements. 
            Network  elements  are  devices  such as hosts, gateways,
            terminal  servers,  and  the  like, which have management
            agents  responsible for performing the network management
            functions  requested  by the network management stations. 
            The  Simple Network Management Protocol (SNMP) is used to
            communicate  management  information  between the network
            management   stations  and  the  agents  in  the  network
            elements.

   Additionally,   SNMP  is  discussed  in  a  number  of  other  RFC
   documents:
      + RFC 3000 Internet Official Protocol Standards
      + RFC 1212 Concise MIB Definitions
      + RFC  1213  Management Information Base for Network Management
        of TCP/IP-based Internets: MIB-II
      + RFC  1215  A  Convention  for Defining Traps for use with the
        SNMP
      + RFC 1270 SNMP Communications Services
      + RFC  2570  Introduction to Version 3 of the Internet-standard
        Network Management Framework
      + RFC  2571  An  Architecture  for  Describing  SNMP Management
        Frameworks
      + RFC  2572  Message  Processing and Dispatching for the Simple
        Network Management Protocol (SNMP)
      + RFC 2573 SNMP Applications
      + RFC 2574 User-based Security Model (USM) for version 3 of the
        Simple Network Management Protocol (SNMPv3)
      + RFC  2575  View-based  Access  Control  Model  (VACM) for the
        Simple Network Management Protocol (SNMP)
      + RFC  2576  Coexistence  between  Version  1,  Version  2, and
        Version   3   of  the  Internet-standard  Network  Management
        Framework
     _____________________________________________________________

   The  CERT  Coordination  Center  thanks the Oulu University Secure
   Programming  Group  for reporting these vulnerabilities to us, for
   providing  detailed  technical  analyses,  and for assisting us in
   preparing  this  advisory.  We also thank Steven M. Bellovin (AT&T
   Labs  --  Research),  Wes Hardaker (Net-SNMP), Steve Moulton (SNMP
   Research),  Tom Reddington (Bell Labs), Mike Duckett (Bell South),
   Rob   Thomas,  Blue  Boar  (Thievco),  and  the  many  others  who
   contributed to this document. 
     _____________________________________________________________

   Feedback  on  this document can be directed to the authors, Ian A. 
   Finlay, Shawn V. Hernan, Jason A. Rafail, Chad Dougherty, Allen D. 
   Householder, Marty Lindner, and Art Manion. 
   __________________________________________________________________

   This document is available from:
   http://www.cert.org/advisories/CA-2002-03.html
   __________________________________________________________________

   CERT/CC Contact Information

    Email: cert@cert.org
            Phone: +1 412-268-7090 (24-hour hotline)
            Fax: +1 412-268-6989
            Postal address:
            CERT Coordination Center
            Software Engineering Institute
            Carnegie Mellon University
            Pittsburgh PA 15213-3890
            U.S.A.

   CERT/CC  personnel  answer  the  hotline  08:00-17:00 EST(GMT-5) /
   EDT(GMT-4) Monday through Friday; they are on call for emergencies
   during other hours, on U.S. holidays, and on weekends.

   Using encryption
   We  strongly  urge  you  to  encrypt sensitive information sent by
   email. Our public PGP key is available from
    http://www.cert.org/CERT_PGP.key
   If  you  prefer  to use DES, please call the CERT hotline for more
   information.

   Getting  security information
   CERT publications and other security information are available
   from our web site
    http://www.cert.org/
   To   subscribe  to  the  CERT  mailing  list  for  advisories  and
   bulletins, send email to majordomo@cert.org. Please include in the
   body of your message

     subscribe cert-advisory

   * "CERT" and "CERT Coordination Center" are registered in the U.S. 
   Patent and Trademark Office. 
   __________________________________________________________________

   NO WARRANTY
   Any  material  furnished  by  Carnegie  Mellon  University and the
   Software  Engineering  Institute is furnished on an "as is" basis. 
   Carnegie Mellon University makes no warranties of any kind, either
   expressed  or  implied as to any matter including, but not limited
   to,   warranty   of   fitness   for   a   particular   purpose  or
   merchantability,  exclusivity  or results obtained from use of the
   material. Carnegie Mellon University does not make any warranty of
   any  kind  with  respect  to  freedom  from  patent, trademark, or
   copyright infringement. 
     _____________________________________________________________

   Conditions for use, disclaimers, and sponsorship information
   Copyright 2002 Carnegie Mellon University.

Revision History

   February 12, 2002: Initial release

-----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8

iQCVAwUBPGltxKCVPMXQI2HJAQGVeAQAuHtxGBsmU5HI6PtqhpZ1rkpV+Cq3ChIU R1FUz4Zi2vzklH8jdXd10KqwZAPhXTPazeguhRyLVSUprMlSKqcXg3BCkH/y4WAl QUZ1VnQXMnMrxIJO1fv0WW0pcyM4W0iQBl0kCIlawPcjCGVniOCOr+4CE0f923wr uZiMJ5f2SEo= =h42e -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200205-0149",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios 12.0",
        "scope": "ne",
        "trust": 5.4,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1",
        "scope": "ne",
        "trust": 3.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "openserver",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "caldera",
        "version": "5.0.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "3com",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "adtran",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "american power conversion",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "aprisma",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "bea",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "bmc",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cnt",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "comtek services",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cscare",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cacheflow",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "carrier access",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "compaq computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "computer associates",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "concord",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "dart",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "dell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "digital",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "entrada",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "equinox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "f5",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "fluke",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "general datacomm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hirschmann",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "iplanet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "itouch",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "infovista",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "inktomi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "innerdive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "ipswitch",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "karlnet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lantronix",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "larscom incorporated",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lotus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "lucent",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mg soft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mandriva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "marconi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mercury interactive",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "metrobility optical",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "micromuse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "monfox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "multinet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "net snmp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "network harmoni",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nbase xyplex",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netscout",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netsilicon",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "netscape",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "network appliance",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "novell",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "openwave",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "optical access",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "oracle",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "perle",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "powerware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "radware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "redback",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "riverstone",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "snmp research",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sniffer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sonus",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "stonesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "the sco group sco unix",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "tivoli",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "toshiba",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "unisphere",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "vertical",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "vina",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "world wide packets",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "xerox",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "e security",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "net com",
        "version": null
      },
      {
        "model": "ios 12.2",
        "scope": "ne",
        "trust": 1.5,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "cisco",
        "version": "30002.5.2"
      },
      {
        "model": "ios 12.0 xe",
        "scope": null,
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 dc2",
        "scope": "ne",
        "trust": 1.2,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s6",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nudesign team",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "outback resource group",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "veritas",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "bintec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "interniche",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ncipher corp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netscreen",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nokia",
        "version": null
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "4.0.1"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "3.0.1"
      },
      {
        "model": "sunatm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sun",
        "version": "2.1"
      },
      {
        "model": "ios 12.0 s7",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 bx",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e8",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s8",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 w5",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 xe?",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "30003.1"
      },
      {
        "model": "ios 12.0 s1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 wc1",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xu",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 db1",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st2",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e3",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 db2",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "30003.0.3"
      },
      {
        "model": "ios 12.1 ex",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "sunnet manager sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.3"
      },
      {
        "model": "sunnet manager intel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.3"
      },
      {
        "model": "sunmc rr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "sunmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "sunmc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.1.1"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.5"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.4"
      },
      {
        "model": "enterprise server ssp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "100003.3"
      },
      {
        "model": "research mid-level manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "research enterpol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "research dr-web manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snmp",
        "version": "15.3"
      },
      {
        "model": "emulex 1gbit fibrechannel hub",
        "scope": null,
        "trust": 0.3,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": "brocade",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "2.6.0"
      },
      {
        "model": "networks aos",
        "scope": null,
        "trust": 0.3,
        "vendor": "redback",
        "version": null
      },
      {
        "model": "realplayer intranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "realnetworks",
        "version": "5.0"
      },
      {
        "model": "software tcpware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "process",
        "version": "5.5"
      },
      {
        "model": "software multinet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "process",
        "version": "4.4"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.0.1"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.2"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.1"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "2.0"
      },
      {
        "model": "enterprise manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1.6.5"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.0"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "5.1"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "5.0"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.11"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.2"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "4.0"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4.1"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.3.1"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.3"
      },
      {
        "model": "ipso",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.1.3"
      },
      {
        "model": "ucd-snmp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.2.1"
      },
      {
        "model": "ucd-snmp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.1.1"
      },
      {
        "model": "windows xp professional",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows xp home",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows nt workstation sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt terminal server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp6a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows nt enterprise server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "4.0"
      },
      {
        "model": "windows 98se",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "98"
      },
      {
        "model": "windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "95"
      },
      {
        "model": "windows terminal services sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows terminal services sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows terminal services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows professional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows datacenter server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "windows advanced server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "2000"
      },
      {
        "model": "domino snmp agents solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1x86"
      },
      {
        "model": "domino snmp agents solaris sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1"
      },
      {
        "model": "domino snmp agents hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "lotus",
        "version": "5.0.1"
      },
      {
        "model": "lrs",
        "scope": null,
        "trust": 0.3,
        "vendor": "lantronix",
        "version": null
      },
      {
        "model": "junos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.1"
      },
      {
        "model": "junos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.0"
      },
      {
        "model": "solutions router ip console",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "innerdive",
        "version": "3.3.0.406"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "secure os software for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "1.0"
      },
      {
        "model": "procurve switch 8000m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4108gl-bundle",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4108gl",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 4000m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2525"
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2524"
      },
      {
        "model": "procurve switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "2512"
      },
      {
        "model": "procurve switch 2424m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 2400m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "procurve switch 1600m",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ov/sam",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "3.0.1"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.10"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.2"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.211.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.210.x"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.2"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.1"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.111.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.110.x"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "openview network node manager nt 4.x/windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.02000"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.011.x"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.010.20"
      },
      {
        "model": "openview network node manager windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.0.23.51/4.0"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.01"
      },
      {
        "model": "openview network node manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.11"
      },
      {
        "model": "openview network node manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.11"
      },
      {
        "model": "openview extensible snmp agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.0"
      },
      {
        "model": "openview emanate snmp agent solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.22.x"
      },
      {
        "model": "openview emanate snmp agent hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.211.x"
      },
      {
        "model": "openview emanate snmp agent hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "14.210.20"
      },
      {
        "model": "openview distributed management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "openview distributed management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.03"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.0"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.5"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "4.0"
      },
      {
        "model": "mc/serviceguard",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jetdirect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.20.00"
      },
      {
        "model": "jetdirect",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.08.00"
      },
      {
        "model": "ito/vpo/ovo unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "ems a.03.20",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ems a.03.10",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ems a.03.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "3.1.02"
      },
      {
        "model": "services nmserver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "comtek",
        "version": "3.4"
      },
      {
        "model": "associates unicenter",
        "scope": null,
        "trust": 0.3,
        "vendor": "computer",
        "version": null
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7.1.1"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7.1.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "7"
      },
      {
        "model": "openunix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "8.0"
      },
      {
        "model": "openserver",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "caldera",
        "version": "5.0.6"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.14"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.13"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.12"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0.11"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "4.0"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.21"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.19"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.18"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.17"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.16"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.15"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.14"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.13"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.12"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.11"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.20"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.10"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.09"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.08"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.07"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.06"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.05"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.04"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.03"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1.02"
      },
      {
        "model": "cacheos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": "3.1"
      },
      {
        "model": "cacheos",
        "scope": null,
        "trust": 0.3,
        "vendor": "cacheflow",
        "version": null
      },
      {
        "model": "web nms msp edition",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "web nms",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "snmp utilities",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "snmp api",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "mediation server",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "management builder",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "fault management toolkit",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "configuration management toolkit",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "cli api",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "agent toolkit java/jmx edition",
        "scope": null,
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "agent toolkit c edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adventnet",
        "version": null
      },
      {
        "model": "webcache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "3000"
      },
      {
        "model": "webcache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "1000"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "4900"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "4400"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "3300"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "1100"
      },
      {
        "model": "ps hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "50"
      },
      {
        "model": "ps hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "3com",
        "version": "40"
      },
      {
        "model": "dual speed hub",
        "scope": null,
        "trust": 0.3,
        "vendor": "3com",
        "version": null
      },
      {
        "model": "brocade .0d",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "2.6"
      },
      {
        "model": "ipso",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nokia",
        "version": "3.4.2"
      },
      {
        "model": "ucd-snmp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "net snmp",
        "version": "4.2.2"
      },
      {
        "model": "solutions router ip console",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "innerdive",
        "version": "3.3.0.407"
      },
      {
        "model": "jetdirect",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.21.00"
      },
      {
        "model": "jetdirect",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "x.08.32"
      },
      {
        "model": "ios 12.0 wc 2900xl-lre",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4700"
      },
      {
        "model": "ios 12.2 yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.7"
      },
      {
        "model": "as5850",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios 12.1aa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xe2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 ca1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.2"
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "hosting solution engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1(4.206)"
      },
      {
        "model": "netranger sensor",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yc2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "as5200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vg248 analog phone gateway",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2gs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ics",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7750"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(8)"
      },
      {
        "model": "ios 12.0 wt6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.5.1"
      },
      {
        "model": "traffic director",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.1.0"
      },
      {
        "model": "ios 12.1 e5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 b2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 t3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3"
      },
      {
        "model": "ios 12.0 xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ya2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5300",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30002.0"
      },
      {
        "model": "cbos b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 11.1 cc4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 4840g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1 aa4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.2"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "39203.0(7)"
      },
      {
        "model": "secure ids network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ios 12.2 mx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7100"
      },
      {
        "model": "cva120",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst native mode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "560"
      },
      {
        "model": "ios 12.1 ea1e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xq",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2sa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1005"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.2.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.5.015"
      },
      {
        "model": "ios 12.2 mx1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1.200)"
      },
      {
        "model": "bpx/igx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12000"
      },
      {
        "model": "content distribution manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4670"
      },
      {
        "model": "ap340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10700"
      },
      {
        "model": "css11000 content services switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.1"
      },
      {
        "model": "ios 12.1 xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "distributed director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2501"
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "intelligent contact manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(1)"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "ios 12.1 yi1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 2948g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 da",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.6"
      },
      {
        "model": "ios 12.1 ew",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(7.202)"
      },
      {
        "model": "ios 12.2 xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "local director",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 da1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv5"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4232"
      },
      {
        "model": "ios 12.1 ec",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "user registration tool vlan policy server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 dd3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "hosting solution engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(1)"
      },
      {
        "model": "ios 11.1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "igx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 t4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8540csr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8240",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 w5",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7010"
      },
      {
        "model": "unity server",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst hybrid mode",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ios 12.0 wc3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(1)"
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "snmpc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.0.4"
      },
      {
        "model": "ios 12.0 st5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0w5",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.0"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "ios 12.0 sl4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst network analysis module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.2"
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xb3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 db2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82301.2.10"
      },
      {
        "model": "ios 12.1 ey",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ios 12.0 xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.4"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82501.2.10"
      },
      {
        "model": "catalyst msm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "nsp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4"
      },
      {
        "model": "ios 12.1 yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "info center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "ios 12.0 wx5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e8",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "arrowpoint cs11000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "secure ids host sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2950"
      },
      {
        "model": "ios 11.1 ct",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ubr7200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "11.3"
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1ia",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8540msr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154544.0(1)"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv4"
      },
      {
        "model": "ios 12.1 t12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "microswitch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1548"
      },
      {
        "model": "ios 12.1 e12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 sx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "access registrar",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "ios 12.0 st",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst 8510csr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xs1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "bpx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea2b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xz7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 b4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2920"
      },
      {
        "model": "ios 12.1 ea1b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2p",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xk3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2600"
      },
      {
        "model": "as5800",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 p2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6200"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1700"
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "507"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7000"
      },
      {
        "model": "ios 12.1 e7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.5.1"
      },
      {
        "model": "ios 12.2 t1a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1(2)"
      },
      {
        "model": "ios 12.2 xa5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.1"
      },
      {
        "model": "ios 12.1 ew1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sp1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1ca",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.053"
      },
      {
        "model": "catalyst 2948g-l3",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2900"
      },
      {
        "model": "ios 12.2 mb3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(2)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1"
      },
      {
        "model": "ios 12.2 t0a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.7"
      },
      {
        "model": "ios 12.0 wc2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ap350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 dx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sl6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5400",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3500"
      },
      {
        "model": "ios 12.0 wc2b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1400"
      },
      {
        "model": "ios 12.1 yb5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xn1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.1"
      },
      {
        "model": "ios 12.1 e6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(3)"
      },
      {
        "model": "bts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10200"
      },
      {
        "model": "ios 12.0 sx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.8"
      },
      {
        "model": "ubr900",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3(2)"
      },
      {
        "model": "ios 12.2 xb4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1aa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "ios 12.0 t2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(7)"
      },
      {
        "model": "ios 12.1 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 sa6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "sc2200/vsc3000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wan manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xm2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 aa1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0wx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "infocenter",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2(5)"
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "570"
      },
      {
        "model": "call manager",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xa1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sc3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 e4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 bc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ex",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8260",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(6)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.1.4"
      },
      {
        "model": "ios 12.1 yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.0"
      },
      {
        "model": "ios 12.2 xj1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 bc1a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "ios 12.1 xm7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.6"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "ios 12.1 ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4430"
      },
      {
        "model": "catalyst supervisor module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ap352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7600"
      },
      {
        "model": "internet cdn content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.0(7)xv"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(3.210)"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(13)"
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cache engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "505"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.1"
      },
      {
        "model": "catalyst xl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2900"
      },
      {
        "model": "netranger",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0"
      },
      {
        "model": "ios 12.1 ex3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4"
      },
      {
        "model": "ios 12.0sl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "br350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "ios 12.2 xt3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content delivery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4650"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0"
      },
      {
        "model": "ios 12.0 st3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1(5)xv"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4500"
      },
      {
        "model": "ios 12.2 xw1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 da3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "br352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xu2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.0"
      },
      {
        "model": "ons metro edge optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "15327"
      },
      {
        "model": "ios 12.2 xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ey3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "microhub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1500"
      },
      {
        "model": "ios 12.2 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yf4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yh3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7320"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3"
      },
      {
        "model": "ios 12.0sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4232-13"
      },
      {
        "model": "ios 11.0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst msfc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "mgx-8220",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "element management framework",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3600"
      },
      {
        "model": "catalyst 4908g-l3",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wgb340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ciscoworks windows/wug",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.5"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2(5)"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios 12.0 s2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8850 r1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 st4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.2 gs6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82501.2.11"
      },
      {
        "model": "ios 12.0 xf1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.5"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.1"
      },
      {
        "model": "rsfc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.3db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "building broadband service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "ios 12.1 ec1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1 ia",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ws-x6624",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea2a",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 yd6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vpn concentrator",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30003.5"
      },
      {
        "model": "ios 11.1 ca2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "icdn software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "secure pix firewall",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7500"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3200"
      },
      {
        "model": "ios 12.2 xi1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "82301.2.11"
      },
      {
        "model": "switchprobe",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "wgb352",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cat6k nam",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "br340",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 xf5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "fasthub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4001.0"
      },
      {
        "model": "ios 12.2 xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.1"
      },
      {
        "model": "ios 12.1 ea2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2mb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "rsm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0wt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "nrp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6400"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.6"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1.4"
      },
      {
        "model": "ws-x6608",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 by2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1600"
      },
      {
        "model": "ios 12.1 xz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xl4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xs?",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.9"
      },
      {
        "model": "catalyst 8510msr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xm1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2500"
      },
      {
        "model": "ios 12.2 ya1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "service expansion shelf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 s",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst msfc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "ons optical transport platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "154543.3"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "ios 12.0 xe1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "iad",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "8110"
      },
      {
        "model": "ios 12.1 ex4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xe2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "ios 12.1 e9",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "ios 11.1ct",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "call manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3(3)"
      },
      {
        "model": "ios 12.1 xp",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7300"
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3550"
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "mgx-8850 r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xd3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ea1a",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "internet cdn content engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "590"
      },
      {
        "model": "ciscoworks windows",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 aa",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 12.2 xk2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "esr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "10000"
      },
      {
        "model": "ls1010 atm switch",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 dc1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.3.7.002"
      },
      {
        "model": "content router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4450"
      },
      {
        "model": "ios 12.1 xi8",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "catalyst",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3900"
      },
      {
        "model": "ios 11.3 db1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "800"
      },
      {
        "model": "mc3810",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 by",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "as5350",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 11.1cc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7200"
      },
      {
        "model": "content delivery manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4630"
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.4(4)"
      },
      {
        "model": "catalyst 4912g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "intelligent contact manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "cbos ap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.4.2"
      },
      {
        "model": "ios 12.0dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "ios 12.2 xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ubr10000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "pix firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.0(2)"
      },
      {
        "model": "ios 12.2 xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "cbos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.1"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:caldera:openserver:5.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovered by the Oulu University Secure Programming Group.",
    "sources": [
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-1999-1570",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-1999-1570",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#107186",
            "trust": 0.8,
            "value": "69.26"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#854306",
            "trust": 0.8,
            "value": "42.64"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200205-001",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in sar for OpenServer 5.0.5 allows local users to gain root privileges via a long -o parameter. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below.  It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. \nThe resultant crash may be due to a buffer overflow condition.  If this is the case, attackers may be able to exploit this vulnerability to execute arbitrary code. SNMP requests are messages sent from manager to agent systems.  They typically poll the agent for current performance or configuration information, ask for the next SNMP object in a Management Information Base (MIB), or modify the configuration settings of the agent. \nMultiple vulnerabilities have been discovered in a number of SNMP implementations.  The vulnerabilities are known to exist in the process of decoding and interpreting SNMP request messages. \nAmong the possible consequences are denial of service and allowing attackers to compromise target systems.  These depend on the individual vulnerabilities in each affected product.  A general report for multiple vendors was initially published on February 12 (Bugtraq IDs 4088 and 4089), however more information is now available and a separate Bugtraq ID has been allocated for the Cisco Operating Systems and Appliances vulnerabilities. \nIt is reportedly possible for a remote attacker to create a denial of service condition by transmitting a malformed SNMP request to a vulnerable Cisco Operating System or Appliance.  The affected device may reset, or require a manual reset to regain functionality. \n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nCERT Advisory CA-2002-03: Multiple Vulnerabilities in Many\nImplementations of the Simple Network Management Protocol (SNMP)\n\n   Original release date: February 12, 2002\n   Last revised: --\n   Source: CERT/CC\n\n   A complete revision history can be found at the end of this file. \n\nSystems Affected\n\n   Products  from  a  very  wide  variety of vendors may be affected. See\n   Vendor Information for details from vendors who have provided feedback\n   for this advisory. \n\n   In  addition to the vendors who provided feedback for this advisory, a\n   list  of  vendors  whom  CERT/CC contacted regarding these problems is\n   available from\n   http://www.kb.cert.org/vuls/id/854306\n   http://www.kb.cert.org/vuls/id/107186 \n\n   Many  other systems making use of SNMP may also be vulnerable but were\n   not specifically tested. \n\n   In addition to this advisory, we also have an FAQ available at\n   http://www.cert.org/tech_tips/snmp_faq.html\n\nI. Description\n\n   The  Simple  Network  Management  Protocol (SNMP) is a widely deployed\n   protocol  that is commonly used to monitor and manage network devices. \n   Version  1  of  the  protocol  (SNMPv1)  defines several types of SNMP\n   messages  that  are  used  to  request  information  or  configuration\n   changes,  respond  to  requests,  enumerate  SNMP  objects,  and  send\n   unsolicited  alerts.  The  Oulu  University  Secure  Programming Group\n   (OUSPG,  http://www.ee.oulu.fi/research/ouspg/)  has reported numerous\n   vulnerabilities in SNMPv1 implementations from many different vendors. \n   More information about SNMP and OUSPG can be found in Appendix C\n\n   OUSPG\u0027s  research  focused  on  the  manner in which SNMPv1 agents and\n   managers  handle  request  and  trap  messages. A trap message\n     may  indicate  a warning or error condition or otherwise notify the\n     manager about the agent\u0027s state. Request\n     messages  might be issued to obtain information from an agent or to\n     instruct  the  agent to configure the host device. \n\n   Vulnerabilities  in  the  decoding  and  subsequent processing of SNMP\n   messages  by  both managers and agents may result in denial-of-service\n   conditions,  format string vulnerabilities, and buffer overflows. Some\n   vulnerabilities  do  not  require  the SNMP message to use the correct\n   SNMP community string. \n\n   These   vulnerabilities   have   been  assigned  the  CVE  identifiers\n   CAN-2002-0012 and CAN-2002-0013, respectively. \n\nII. \n\nIII. Solution\n\n   Note  that  many  of  the  mitigation steps recommended below may have\n   significant  impact on your everyday network operations and/or network\n   architecture.  Ensure  that  any  changes  made based on the following\n   recommendations  will  not  unacceptably  affect  your ongoing network\n   operations capability. \n\nApply a patch from your vendor\n\n   Appendix A contains information provided by vendors for this advisory. \n   Please  consult this appendix to determine if you need to contact your\n   vendor directly. \n\nDisable the SNMP service\n\n   As  a  general  rule,  the CERT/CC recommends disabling any service or\n   capability   that   is   not   explicitly  required,  including  SNMP. \n   Unfortunately,  some  of  the  affected  products exhibited unexpected\n   behavior  or  denial  of  service conditions when exposed to the OUSPG\n   test  suite  even  if  SNMP was not enabled. In these cases, disabling\n   SNMP should be used in conjunction with the filtering practices listed\n   below to provide additional protection. \n\nIngress filtering\n\n   As a temporary measure, it may be possible to limit the scope of these\n   vulnerabilities  by  blocking  access  to SNMP services at the network\n   perimeter. \n\n   Ingress  filtering  manages the flow of traffic as it enters a network\n   under  your  administrative  control.  Servers  are typically the only\n   machines that need to accept inbound traffic from the public Internet. \n   In  the  network usage policy of many sites, there are few reasons for\n   external hosts to initiate inbound traffic to machines that provide no\n   public  services.  Thus,  ingress filtering should be performed at the\n   border   to   prohibit   externally   initiated   inbound  traffic  to\n   non-authorized  services. For SNMP, ingress filtering of the following\n   ports  can  prevent  attackers  outside of your network from impacting\n   vulnerable  devices  in  the  local  network  that  are not explicitly\n   authorized to provide public SNMP services. \n\n   snmp     161/udp     # Simple Network Management Protocol (SNMP)\n   snmp     162/udp     # SNMP system management messages\n\n   The  following  services  are  less  common,  but  may be used on some\n   affected products\n\n   snmp               161/tcp     #  Simple  Network  Management Protocol\n   (SNMP)\n   snmp               162/tcp     # SNMP system management messages\n   smux               199/tcp     # SNMP Unix Multiplexer\n   smux               199/udp     # SNMP Unix Multiplexer\n   synoptics-relay    391/tcp     # SynOptics SNMP Relay Port\n   synoptics-relay    391/udp     # SynOptics SNMP Relay Port\n   agentx             705/tcp     # AgentX\n   snmp-tcp-port     1993/tcp     # cisco SNMP TCP port\n   snmp-tcp-port     1993/udp     # cisco SNMP TCP port\n\n   As  noted  above, you should carefully consider the impact of blocking\n   services that you may be using. \n\n   It  is  important  to note that in many SNMP implementations, the SNMP\n   daemon may bind to all IP interfaces on the device. This has important\n   consequences  when  considering  appropriate packet filtering measures\n   required  to  protect  an  SNMP-enabled device. For example, even if a\n   device  disallows  SNMP  packets  directed  to the IP addresses of its\n   normal  network  interfaces, it may still be possible to exploit these\n   vulnerabilities  on that device through the use of packets directed at\n   the following IP addresses:\n     * \"all-ones\" broadcast address\n     * subnet broadcast address\n     * any  internal  loopback  addresses  (commonly  used in routers for\n       management purposes, not to be confused with the IP stack loopback\n       address 127.0.0.1)\n\n   Careful  consideration  should  be  given  to  addresses  of the types\n   mentioned  above  by  sites  planning  for packet filtering as part of\n   their mitigation strategy for these vulnerabilities. \n\n   Finally,  sites may wish to block access to the following RPC services\n   related to SNMP (listed as name, program ID, alternate names)\n\n   snmp               100122  na.snmp snmp-cmc snmp-synoptics snmp-unisys\n   snmp-utk\n   snmpv2             100138  na.snmpv2     # SNM Version 2.2.2\n   snmpXdmid          100249\n\n   Please  note  that  this workaround may not protect vulnerable devices\n   from internal attacks. \n\nFilter SNMP traffic from non-authorized internal hosts\n\n   In  many networks, only a limited number of network management systems\n   need to originate SNMP request messages. This can reduce, but not wholly eliminate, the\n   risk  from  internal attacks. However, it may have detrimental effects\n   on  network  performance  due  to  the  increased  load imposed by the\n   filtering, so careful consideration is required before implementation. \n   Similar  caveats  to  the  previous workaround regarding broadcast and\n   loopback addresses apply. \n\nChange default community strings\n\n   Most  SNMP-enabled  products  ship  with  default community strings of\n   \"public\"  for read-only access and \"private\" for read-write access. As\n   with   any   known  default  access  control  mechanism,  the  CERT/CC\n   recommends  that network administrators change these community strings\n   to  something  of  their  own  choosing.  However, even when community\n   strings  are changed from their defaults, they will still be passed in\n   plaintext and are therefore subject to packet sniffing attacks. SNMPv3\n   offers additional capabilities to ensure authentication and privacy as\n   described in RFC2574. \n\n   Because  many of the vulnerabilities identified in this advisory occur\n   before  the  community  strings are evaluated, it is important to note\n   that  performing  this  step  alone  is not sufficient to mitigate the\n   impact  of  these vulnerabilities. Nonetheless, it should be performed\n   as part of good security practice. \n\nSegregate SNMP traffic onto a separate management network\n\n   In  situations  where  blocking  or  disabling  SNMP  is not possible,\n   exposure  to  these  vulnerabilities may be limited by restricting all\n   SNMP  access  to  separate,  isolated management networks that are not\n   publicly  accessible.  Although  this would ideally involve physically\n   separate networks, that kind of separation is probably not feasible in\n   most environments. Mechanisms such as virtual LANs (VLANs) may be used\n   to  help  segregate  traffic  on  the same physical network. Note that\n   VLANs  may  not  strictly  prevent  an  attacker from exploiting these\n   vulnerabilities,  but  they may make it more difficult to initiate the\n   attacks. \n\n   Another  option  is  for  sites  to  restrict SNMP traffic to separate\n   virtual private networks (VPNs), which employ cryptographically strong\n   authentication. \n\n   Note  that  these  solutions may require extensive changes to a site\u0027s\n   network architecture. \n\nEgress filtering\n\n   Egress  filtering  manages  the flow of traffic as it leaves a network\n   under your administrative control. There is typically limited need for\n   machines providing public services to initiate outbound traffic to the\n   Internet.  In  the  case  of  SNMP  vulnerabilities,  employing egress\n   filtering on the ports listed above at your network border can prevent\n   your network from being used as a source for attacks on other sites. \n\nDisable stack execution\n\n   Disabling  executable  stacks  (on systems where this is configurable)\n   can  reduce  the  risk  of  \"stack  smashing\"  attacks  based on these\n   vulnerabilities. Although this does not provide 100 percent protection\n   against exploitation of these vulnerabilities, it makes the likelihood\n   of a successful exploit much smaller. On many UNIX systems, executable\n   stacks can be disabled by adding the following lines to /etc/system:\n\n   set noexec_user_stack = 1 set noexec_user_stack_log = 1\n\n   Note  that  this  may  go  against the SPARC and Intel ABIs and can be\n   bypassed  as required in programs with mprotect(2). For the changes to\n   take effect you will then need to reboot. \n\n   Other  operating  systems and architectures also support the disabling\n   of executable stacks either through native configuration parameters or\n   via  third-party  software.  Consult  your  vendor(s)  for  additional\n   information. \n\nShare tools and techniques\n\n   Because  dealing with these vulnerabilities to systems and networks is\n   so  complex, the CERT/CC will provide a forum where administrators can\n   share  ideas  and  techniques  that  can  be  used  to  develop proper\n   defenses.  We  have created an unmoderated mailing list for system and\n   network administrators to discuss helpful techniques and tools. \n\n   You  can  subscribe to the mailing list by sending an email message to\n   majordomo@cert.org. In the body of the message, type\n\n   subscribe snmp-forum\n\n   After you receive the confirmation message, follow the instructions in\n   the message to complete the subscription process. \n\nAppendix A. - Vendor Information\n\n   This  appendix  contains  information  provided  by  vendors  for this\n   advisory.  As  vendors  report new information to the CERT/CC, we will\n   update this section and note the changes in our revision history. If a\n   particular  vendor  is  not  listed  below, we have not received their\n   comments. \n\nAdventNet\n\n     This  is in reference to your notification regarding [VU#107186 and\n     VU#854306]  and  OUSPG#0100.   AdventNet  Inc.  has reproduced this\n     behavior  in  their  products and coded a Service Pack fix which is\n     currently   in   regression   testing   in  AdventNet  Inc.\u0027s  Q.A. \n     organization.    The  release  of  AdventNet  Inc\u0027s.  Service  Pack\n     correcting  the  behavior  outlined in VU#617947, and OUSPG#0100 is\n     scheduled  to  be  generally  available  to all of AdventNet Inc.\u0027s\n     customers by February 20, 2002. \n\nAvaya\n\n     Avaya  Inc. No further information is available at this time. \n\nCacheFlow\n\n     The  purpose of this email is to advise you that CacheFlow Inc. has\n     provided a software update. Please be advised that updated versions\n     of  the  software  are  now  available  for all supported CacheFlow\n     hardware  platforms,  and may be obtained by CacheFlow customers at\n     the following URL:\n\n          http://download.cacheflow.com/\n\n   The  specific reference to the software update is contained within the\n   Release  Notes  for  CacheOS  Versions 3.1.22 Release ID 17146, 4.0.15\n   Release ID 17148, 4.1.02 Release ID 17144 and 4.0.15 Release ID 17149. \n\n   RELEASE NOTES FOR CACHEFLOW SERVER ACCELERATOR PRODUCTS:\n     * http://download.cacheflow.com/release/SA/4.0.15/relnotes.htm\n\n   RELEASE NOTES FOR CACHEFLOW CONTENT ACCELERATOR PRODUCTS:\n     * http://download.cacheflow.com/release/CA/3.1.22/relnotes.htm\n     * http://download.cacheflow.com/release/CA/4.0.15/relnotes.htm\n     * http://download.cacheflow.com/release/CA/4.1.02/relnotes.htm\n\n     * SR   1-1647517,   VI  13045:  This  update  modified  a  potential\n     vulnerability by using an SNMP test tools exploit. \n\n3Com Corporation\n\n     A  vulnerability to an SNMP packet with an invalid length community\n     string  has  been  resolved  in  the  following products. Customers\n     concerned  about  this  weakness should ensure that they upgrade to\n     the following agent versions:\n     PS Hub 40\n     2.16 is due Feb 2002\n     PS Hub 50\n     2.16 is due Feb 2002\n     Dual Speed Hub\n     2.16 is due Jan 2002\n     Switch 1100/3300\n     2.68 is available now\n     Switch 4400\n     2.02 is available now\n     Switch 4900\n     2.04 is available now\n     WebCache1000/3000\n     2.00 is due Jan 2002\n\nCaldera\n\n     Caldera   International,  Inc.  has  reproduced  faulty behavior in\n     Caldera SCO OpenServer 5, Caldera UnixWare 7, and Caldera Open UNIX\n     8.  We have coded a software fix for  supported versions of Caldera\n     UnixWare  7  and  Caldera  Open UNIX 8 that will  be available from\n     our   support   site  at  http://stage.caldera.com/support/security\n     immediately  following the publication of this CERT announcement. A\n     fix  for  supported versions of OpenServer 5 will be available at a\n     later date. \n\nCisco Systems\n\n     Cisco  Systems  is  addressing  the  vulnerabilities  identified by\n     VU#854306  and VU#107186 across its entire product line. Cisco will\n     publish    a    security   advisory   with   further   details   at\n     http://www.cisco.com/go/psirt/. \n\nCompaq Computer Corporation\n\n     x-ref: SSRT0779U SNMP\n     At  the time of writing this document, COMPAQ continues to evaluate\n     this potential problem and when new versions of SNMP are available,\n     COMPAQ  will implement solutions based on the new code. Compaq will\n     provide  notice  of  any  new  patches  as  a result of that effort\n     through  standard  patch  notification  procedures and be available\n     from your normal Compaq Services support channel. \n\nComputer Associates\n\n     Computer  Associates  has  confirmed Unicenter vulnerability to the\n     SNMP  advisory identified by CERT notification reference [VU#107186\n     \u0026   VU#854306]   and   OUSPG#0100.   We  have  produced  corrective\n     maintenance  to  address  these  vulnerabilities,  which  is in the\n     process  of publication for all applicable releases / platforms and\n     will  be  offered  through the CA Support site.  Please contact our\n     Technical    Support   organization   for   information   regarding\n     availability / applicability for your specific configuration(s). \n\nCOMTEK Services, Inc. \n\n     NMServer  for  AS/400  is  not  an SNMP master and is therefore not\n     vulnerable.  However  this  product  requires the use of the AS/400\n     SNMP  master  agent  supplied  by  IBM. \n\n     NMServer   for  OpenVMS  has  been  tested  and  has  shown  to  be\n     vulnerable.  COMTEK  Services  is  preparing  a new release of this\n     product  (version  3.5)  which will contain a fix for this problem. \n     This  new  release  is  scheduled to be available in February 2002. \n     Contact COMTEK Services for further information. \n\n     NMServer  for VOS has not as yet been tested; vulnerability of this\n     agent  is  unknown.  Contact for further information on the testing\n     schedule of the VOS product. \n\nCovalent Technologies\n\n     Covalent Technologies ERS (Enterprise Ready Server), Secure Server,\n     and  Conductor  SNMP module are not vulnerable according to testing\n     performed   in   accordance  with  CERT  recommendations.  Security\n     information for Covalent products can be found at www.covalent.net\n\nDartware, LLC\n\n     Dartware,  LLC  (www.dartware.com)  supplies  two products that use\n     SNMPv1  in  a  manager  role,  InterMapper  and SNMP Watcher.  This statement applies to all present\n     and past versions of these two software packages. \n\nDMH Software\n\n     DMH  Software  is  in  the  process of evaluating and attempting to\n     reproduce this behavior. \n     It  is  unclear at this point if our snmp-agent is sensitive to the\n     tests described above. \n     If  any  problems  will  be  discovered,  DMH  Software will code a\n     software fix. \n     The  release of DMH Software OS correcting the behavior outlined in\n     VU#854306, VU#107186, and OUSPG#0100 will be generally available to\n     all of DMH Software\u0027s customers as soon as possible. \n\nEnGarde Secure Linux\n\n     EnGarde  Secure  Linux  did  not  ship any SNMP packages in version\n     1.0.1 of our distribution, so we are not vulnerable to either bug. \n\nFreeBSD\n\n     FreeBSD  does  not  include any SNMP software by default, and so is\n     not vulnerable.  However, the FreeBSD Ports Collection contains the\n     UCD-SNMP   /   NET-SNMP   package.    Package   versions  prior  to\n     ucd-snmp-4.2.3  are  vulnerable.   The upcoming FreeBSD 4.5 release\n     will  ship  the  corrected  version  of  the  UCD-SNMP  /  NET-SNMP\n     package.   In  addition,  the  corrected version of the packages is\n     available from the FreeBSD mirrors. \n\n     FreeBSD   has   issued  the  following  FreeBSD  Security  Advisory\n     regarding the UCD-SNMP / NET-SNMP package:\n     ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:09. \n     snmp.asc. \n\nHewlett-Packard Company\n\n     SUMMARY - known vulnerable:\n     ========================================\n     hp procurve switch 2524\n     NNM  (Network Node Manager)\n     JetDirect Firmware (Older versions only)\n     HP-UX Systems running snmpd or OPENVIEW\n     MC/ServiceGuard\n     EMS\n     Still under investigation:\n     SNMP/iX (MPE/iX)\n     ========================================\n     _________________________________________________________\n     ---------------------------------------------------------\n     hp procurve switch 2524 \n     ---------------------------------------------------------\n     hp procurve switch 2525 (product J4813A) is vulnerable to some\n     issues, patches in process. Watch for the associated HP\n     Security Bulletin. \n     ---------------------------------------------------------\n     NNM  (Network Node Manager)\n     ---------------------------------------------------------\n     Some problems were found in NNM product were related to\n     trap handling. Patches in process. Watch for the\n     associated HP Security Bulletin. \n     ---------------------------------------------------------\n     JetDirect Firmware (Older versions only)\n     ---------------------------------------------------------\n     ONLY some older versions of JetDirect Firmware are\n     vulnerable to some of the issues.  The older firmware\n     can be upgraded in most cases, see list below. \n     JetDirect Firmware Version    State\n     ==========================    =====\n        X.08.32 and higher     NOT Vulnerable\n        X.21.00 and higher     NOT Vulnerable\n     JetDirect Product Numbers that can be freely\n     upgraded to X.08.32 or X.21.00 or higher firmware. \n     EIO (Peripherals Laserjet 4000, 5000, 8000, etc...)\n     J3110A 10T\n     J3111A 10T/10B2/LocalTalk\n     J3112A Token Ring (discontinued)\n     J3113A 10/100 (discontinued)\n     J4169A 10/100\n     J4167A Token Ring\n     MIO (Peripherals LaserJet 4, 4si, 5si, etc...)\n     J2550A/B 10T (discontinued)\n     J2552A/B 10T/10Base2/LocalTalk (discontinued)\n     J2555A/B Token Ring (discontinued)\n     J4100A 10/100\n     J4105A Token Ring\n     J4106A 10T\n     External Print Servers\n     J2591A EX+ (discontinued)\n     J2593A EX+3 10T/10B2 (discontinued)\n     J2594A EX+3 Token Ring (discontinued)\n     J3263A 300X 10/100\n     J3264A 500X Token Ring\n     J3265A 500X 10/100\n     ----------------------------------------------------------\n     HP-UX Systems running snmpd or OPENVIEW\n     ----------------------------------------------------------\n     The following patches are available now:\n       PHSS_26137 s700_800 10.20 OV EMANATE14.2 Agent Consolidated Patch\n       PHSS_26138 s700_800 11.X  OV EMANATE14.2 Agent Consolidated Patch\n       PSOV_03087 EMANATE Release 14.2 Solaris 2.X  Agent Consolidated\n     Patch\n     All three patches are available from:\n     http://support.openview.hp.com/cpe/patches/\n     In addition PHSS_26137 and PHSS_26138 will soon be available from:\n     http://itrc.hp.com\n     ================================================================\n     NOTE: The patches are labeled OV(Open View). However, the patches\n     are also applicable to systems that are not running Open View. \n     =================================================================\n     Any   HP-UX  10.X  or  11.X  system  running  snmpd  or  snmpdm  is\n     vulnerable. \n     To determine if your HP-UX system has snmpd or snmpdm installed:\n       swlist -l file | grep snmpd\n     If a patch is not available for your platform or you cannot install\n     an  available  patch,  snmpd and snmpdm can be disabled by removing\n     their\n     entries  from  /etc/services  and  removing the execute permissions\n     from\n     /usr/sbin/snmpd and /usr/sbin/snmpdm. \n     ----------------------------------------------------------------\n     Investigation completed, systems vulnerable. \n     ----------------------------------------------------------------\n     MC/ServiceGuard\n     Event Monitoring System  (EMS)\n     ----------------------------------------------------------------\n       Still under investigation:\n     ----------------------------------------------------------------\n     SNMP/iX (MPE/iX)\n\nHirschmann Electronics GmbH \u0026 Co. KG\n\n     Hirschmann  Electronics  GmbH  \u0026  Co.  KG supplies a broad range of\n     networking  products,  some  of  which  are  affected  by  the SNMP\n     vulnerabilities  identified by CERT Coordination Center. Hirschmann customers may contact our Competence\n     Center (phone +49-7127-14-1538, email:\n     ans-support@nt.hirschmann.de)     for    additional    information,\n     especially  regarding  availability  of  latest  firmware  releases\n     addressing the SNMP vulnerabilities. \n\nIBM Corporation\n\n     Based  upon  the  results  of  running  the  test  suites  we  have\n     determined  that  our  version  of  SNMP  shipped  with  AIX is NOT\n     vulnerable. \n\nInnerdive Solutions, LLC\n\n     Innerdive Solutions, LLC has two SNMP based products:\n     1. The \"SNMP MIB Scout\"\n     (http://www.innerdive.com/products/mibscout/)\n     2. The \"Router IP Console\" (http://www.innerdive.com/products/ric/)\n     The \"SNMP MIB Scout\" is not vulnerable to either bug. \n     The \"Router IP Console\" releases prior to 3.3.0.407 are vulnerable. \n     The release of \"Router IP Console\" correcting the behavior outlined\n     in  OUSPG#0100  is  3.3.0.407 and is already available on our site. \n     Also,  we  will  notify all our customers about this new release no\n     later than March 5, 2002. \n\nJuniper Networks\n\n     This  is  in reference to your notification regarding CAN-2002-0012\n     and  CAN-2002-0013.   Juniper Networks has reproduced this behavior\n     and coded a software fix.  The fix will be included in all releases\n     of  JUNOS Internet software built after January 5, 2002.  Customers\n     with  current  support contracts can download new software with the\n     fix from Juniper\u0027s web site at www.juniper.net. \n     Note: The behavior described in CAN-2002-0012 and CAN-2002-0013 can\n     only  be  reproduced  in JUNOS Internet software if certain tracing\n     options  are  enabled.   These options are generally not enabled in\n     production routers. \n\nLantronix, Inc. \n\n     Lantronix  is  committed  to  resolving  security  issues  with our\n     products.  The SNMP security bug you reported has been fixed in LRS\n     firmware version B1.3/611(020123). \n\nLotus Development Corporation\n\n     Lotus    Software   evaluated   the   Lotus   Domino   Server   for\n     vulnerabilities using the test suite materials provided by OUSPG. \n     This  problem  does  not affect default installations of the Domino\n     Server.   However,  SNMP  agents  can  be  installed from the CD to\n     provide  SNMP  services for the Domino Server (these are located in\n     the   /apps/sysmgmt/agents   directory).    The  optional  platform\n     specific  master  and  encapsulator  agents included with the Lotus\n     Domino  SNMP  Agents  for  HP-UX  and Solaris have been found to be\n     vulnerable.  For  those  platforms,  customers  should  upgrade  to\n     version  R5.0.1  a  of  the Lotus Domino SNMP Agents, available for\n     download  from the Lotus Knowledge Base on the IBM Support Web Site\n     (http://www.ibm.com/software/lotus/support/).   Please   refer   to\n     Document  #191059,  \"Lotus Domino SNMP Agents R5.0.1a\", also in the\n     Lotus Knowledge Base, for more details. \n\nLOGEC Systems Inc\n\n     The  products  from  LOGEC  Systems are exposed to SNMP only via HP\n     OpenView.  We  do  not have an implementation of SNMP ourselves. As\n     such,  there is nothing in our products that would be an issue with\n     this alert. \n\nLucent\n\n     Lucent is aware of reports that there is a vulnerability in certain\n     implementations  of  the  SNMP (Simple Network Management Protocol)\n     code  that  is  used in data switches and other hardware throughout\n     the telecom industry. \n     As soon as we were notified by CERT, we began assessing our product\n     portfolio  and  notifying  customers  with  products  that might be\n     affected. \n     Our  5ESS  switch  and  most  of  our  optical  portfolio  were not\n     affected.   Our  core  and  edge  ATM switches and most of our edge\n     access  products  are  affected, but we have developed, tested, and\n     deployed  fixes for many of those products to our customers. \n     We consider the security and reliability of our customers\u0027 networks\n     to  be  one  of  our  critical  measures  of success. We take every\n     reasonable measure to ensure their satisfaction. \n     In  addition,  we  are  working  with  customers on ways to further\n     enhance the security they have in place today. \n\nMarconi\n\n     Marconi  supplies  a  broad range of telecommunications and related\n     products,  some  of  which are affected by the SNMP vulnerabilities\n     identified  here. Those\n     Marconi   customers   with  support  entitlement  may  contact  the\n     appropriate   Technical  Assistance  Center  (TAC)  for  additional\n     information.  Those not under support entitlement may contact their\n     sales representative. \n\nMicrosoft Corporation\n\n     The  Microsoft  Security Reponse [sic] Center has investigated this\n     issue, and provides the following information.  The  SNMP v1 service is not installed or running by\n     default on any version of Windows. A patch is underway to eliminate\n     the  vulnerability.  In  the  meantime,  we recommend that affected\n     customers disable the SNMP v1 service. \n\n     Details:\n     An  SNMP  v1 service ships on the CDs for Windows 95, 98, and 98SE. \n     It  is  not  installed  or  running  by  default  on  any  of these\n     platforms.  An SNMP v1 is NOT provided for Windows ME.  However, it\n     is  possible  that  Windows  98  machines  which  had  the  service\n     installed  and  were  upgraded would still have the service.  Since\n     SNMP  is  not  supported for WinME, customers in this situation are\n     urged to remove the SNMP service. \n     An  SNMP  v1  service  is  available  on  Windows NT 4.0 (including\n     Terminal  Server  Edition) and Windows 2000 but is not installed or\n     running  by  default  on any of these platforms.Windows XP does not\n     ship with an SNMP v1 service. \n\n     Remediation:\n     A  patch  is  underway  for  the  affected  platforms,  and will be\n     released  shortly.  In  the  meantime,  Microsoft  recommends  that\n     customers  who  have  the  SNMP  v1  service  running disable it to\n     protect their systems. Following are instruction for doing this:\n\n     Windows 95, 98 and 98SE:\n     1. In Control Panel, double-click Network. \n     2. On  the  Configuration  tab,  select Microsoft SNMP Agent from the\n        list of installed components. \n     3. Click Remove\n\n     Check the following keys and confirm that snmp.exe is not listed. \n     HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunSer\n     vices\n     HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\n \n     For Windows XP:\n     1. Right-click on My Computer and select Manage\n     2. Click on Services and Applications, then on Services\n     3. Location  SNMP  on  the list of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click  OK  to  close  the  dialoge  [sic], then close the Computer\n        Management window. \n   \n     For Windows NT 4.0 (including Terminal Server Edition):\n     1. Select Start, then Settings. \n     2. Select Control Panel, then click on the Services Icon\n     3. Locate  SNMP  on  the  list  of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click OK to close the dialoge [sic], then close Control Panel\n\n     Windows 2000:\n     1. Right-click on My Computer and select Manage\n     2. Click on Services and Applications, then on Services\n     3. Location  SNMP  on  the list of services, then select it and click\n        Stop. \n     4. Select Startup, and click Disabled. \n     5. Click  OK  to  close  the  dialoge  [sic], then close the Computer\n        Management window. \n\nMultinet\n\n     MultiNet  and  TCPware customers should contact Process Software to\n     check  for  the availability of patches for this issue. A couple of\n     minor  problems were found and fixed, but there is no security risk\n     related to the SNMP code included with either product. \n\nNetaphor\n\n     NETAPHOR  SOFTWARE INC. is the creator of Cyberons for Java -- SNMP\n     Manager  Toolkit  and Cyberons for Java -- NMS Application Toolkit,\n     two   Java  based  products  that  may  be  affected  by  the  SNMP\n     vulnerabilities  identified  here.  The  manner  in  which they are\n     affected  and the actions required (if any) to avoid being impacted\n     by  exploitation  of  these  vulnerabilities,  may  be  obtained by\n     contacting  Netaphor  via email at info@netaphor.com Customers with\n     annual support may contact support@netaphor.com directly. Those not\n     under    support    entitlement   may   contact   Netaphor   sales:\n     sales@netaphor.com or (949) 470 7955 in USA. \n\nNetBSD\n\n     NetBSD does not ship with any SNMP tools in our \u0027base\u0027 releases. We\n     do  provide  optional  packages  which  provide various support for\n     SNMP.  These  packages  are  not installed by default, nor are they\n     currently  provided  as  an  install option by the operating system\n     installation tools. A system administrator/end-user has to manually\n     install this with our package management tools. These SNMP packages\n     include:\n          + netsaint-plugin-snmp-1.2.8.4  (SNMP  monitoring  plug-in  for\n            netsaint)\n          + p5-Net-SNMP-3.60 (perl5 module for SNMP queries)\n          + p5-SNMP-3.1.0  (Perl5  module for interfacing to the UCD SNMP\n            library\n          + p5-SNMP_Session-0.83   (perl5  module  providing  rudimentary\n            access to remote SNMP agents)\n          + ucd-snmp-4.2.1  (Extensible  SNMP  implementation) (conflicts\n            with ucd-snmp-4.1.2)\n          + ucd-snmp-4.1.2  (Extensible  SNMP  implementation) (conflicts\n            with ucd-snmp-4.2.1)\n\n     We    do   provide   a   software   monitoring   mechanism   called\n     \u0027audit-packages\u0027,  which allows us to highlight if a package with a\n     range  of  versions  has  a potential vulnerability, and recommends\n     that the end-user upgrade the packages in question. \n\nNetscape Communications Corporation\n\n     Netscape  continues  to be committed to maintaining a high level of\n     quality  in  our  software  and  service  offerings.  Part  of this\n     commitment  includes  prompt response to security issues discovered\n     by organizations such as the CERT Coordination Center. \n     According  to a recent CERT/CC advisory, The Oulu University Secure\n     Programming  Group (OUSPG) has reported numerous vulnerabilities in\n     multiple  vendor  SNMPv1 implementations. \n     We  have  carefully  examined the reported findings, performing the\n     tests  suggested  by the OUSPG to determine whether Netscape server\n     products  were  subject to these vulnerabilities. It was determined\n     that several products fell into this category. As a result, we have\n     created  fixes  which will resolve the issues, and these fixes will\n     appear  in  future  releases  of  our  product  line. To Netscape\u0027s\n     knowledge,  there  are  no known instances of these vulnerabilities\n     being exploited and no customers have been affected to date. \n     When such security warnings are issued, Netscape has committed to -\n     and will continue to commit to - resolving these issues in a prompt\n     and timely fashion, ensuring that our customers receive products of\n     the highest quality and security. \n\nNET-SNMP\n\n     All  ucd-snmp  version  prior  to  4.2.2  are  susceptible  to this\n     vulnerability  and  users  of  versions  prior to version 4.2.2 are\n     encouraged   to   upgrade   their  software  as  soon  as  possible\n     (http://www.net-snmp.org/download/).  Version  4.2.2 and higher are\n     not susceptible. \n\nNetwork Associates\n\n     PGP is not affected, impacted, or otherwise related to this VU#. \n\nNetwork Computing Technologies\n\n     Network   Computing   Technologies  has  reviewed  the  information\n     regarding  SNMP  vulnerabilities and is currently investigating the\n     impact to our products. \n\nNokia\n\n     This  vulnerability  is  known  to affect IPSO versions 3.1.3, 3.3,\n     3.3.1,  3.4,  and  3.4.1.   Patches  are  currently  available  for\n     versions  3.3,  3.3.1,  3.4  and  3.4.1 for download from the Nokia\n     website.   In  addition,  version  3.4.2  shipped  with  the  patch\n     incorporated,  and the necessary fix will be included in all future\n     releases of IPSO. \n     We  recommend customers install the patch immediately or follow the\n     recommended precautions below to avoid any potential exploit. \n     If you are not using SNMP services, including Traps, simply disable\n     the   SNMP   daemon   to   completely   eliminate   the   potential\n     vulnerability. \n     If   you  are  using  only  SNMP  Traps  and  running  Check  Point\n     FireWall-1,  create  a  firewall  policy  to disallow incoming SNMP\n     messages on all appropriate interfaces. Traps will continue to work\n     normally. \n\nNortel Networks\n\n     The  CERT Coordination Center has issued a broad based alert to the\n     technology industry, including Nortel Networks, regarding potential\n     security   vulnerabilities   identified   in   the  Simple  Network\n     Management  Protocol  (SNMP),  a  common  networking  standard. The\n     company   is   working   with  CERT  and  other  network  equipment\n     manufacturers, the U.S. Government, service providers, and software\n     suppliers to assess and address this issue. \n\nNovell\n\n     Novell ships SNMP.NLM and SNMPLOG.NLM with NetWare 4.x, NetWare 5.x\n     and  6.0  systems. The SNMP and SNMPLOG vulnerabilities detected on\n     NetWare  are  fixed and will be available through NetWare 6 Support\n     Pack 1 \u0026 NetWare 5.1 Support Pack 4. Support packs are available at\n     http://support.novell.com/tools/csp/\n\nOpenBSD\n\n     OpenBSD does not ship SNMP code. \n\nQualcomm\n\n     WorldMail  does  not  support SNMP by default, so customers who run\n     unmodified installations are not vulnerable. \n\nRedback Networks, Inc. \n\n     Redback  Networks,  Inc.  has  identified that the vulnerability in\n     question  affects  certain versions of AOS software on the SMS 500,\n     SMS  1800,  and  SMS 10000 platforms, and is taking the appropriate\n     steps necessary to correct the issue. \n\nRed Hat\n\n     RedHat has released a security advisiory [sic] at\n     http://www.redhat.com/support/errata/RHSA-2001-163.html\n     with  updated  versions  of  the ucd-snmp package for all supported\n     releases and architectures. For more information or to download the\n     update please visit this page. \n\nSGI\n\n     SGI  acknowledges  the SNMP vulnerabilities reported by CERT and is\n     currently  investigating.  No  further  information is available at\n     this time. \n     For  the  protection  of  all our customers, SGI does not disclose,\n     discuss  or  confirm vulnerabilities until a full investigation has\n     occurred  and  any  necessary  patch(es)  or  release  streams  are\n     available  for all vulnerable and supported IRIX operating systems. \n     Until SGI has more definitive information to provide, customers are\n     encouraged  to  assume  all security vulnerabilities as exploitable\n     and  take  appropriate  steps  according  to  local  site  security\n     policies   and   requirements.   As   further  information  becomes\n     available,  additional advisories will be issued via the normal SGI\n     security  information  distribution  methods  including the wiretap\n     mailing list on http://www.sgi.com/support/security/. \n\nSNMP Research International\n\n     SNMP  Research  has  made  the following vendor statement. They are\n     likely  to  revise  and  expand  the  statement as the date for the\n     public vulnerability announcement draws nearer.   Users  maintaining\n     earlier  releases should update to the current release if they have\n     not  already  done  so.  Up-to-date  information  is available from\n     support@snmp.com. Other Stonesoft\u0027s products are\n     still   under   investigation.   As   further  information  becomes\n     available, additional advisories will be available at\n     http://www.stonesoft.com/support/techcenter/\n\nSun Microsystems, Inc. \n\n     Sun\u0027s  SNMP  product,  Solstice  Enterprise Agents (SEA), described\n     here:\n     http://www.sun.com/solstice/products/ent.agents/\n     is  affected  by VU#854306 but not VU#107186. More specifically the\n     main  agent  of  SEA, snmpdx(1M), is affected on Solaris 2.6, 7, 8. \n     Sun  is  currently  generating  patches  for this issue and will be\n     releasing  a  Sun Security Bulletin once the patches are available. \n     The bulletin will be available from:\n     http://sunsolve.sun.com/security.  Sun  patches are available from:\n     http://sunsolve.sun.com/securitypatch. \n\nSymantec Corporation\n\n     Symantec Corporation has investigated the SNMP issues identified by\n     the  OUSPG test suite and determined that Symantec products are not\n     susceptable [sic] to these issues. \n\nTANDBERG\n\n     Tandberg  have  run  all  the  testcases found the PROTOS test-suie\n     [sic], c06snmpv1:\n     1. c06-snmpv1-trap-enc-pr1.jar\n     2. c06-snmpv1-treq-app-pr1.jar\n     3. c06-snmpv1-trap-enc-pr1.jar\n     4. c06-snmpv1-req-app-pr1.jar\n     The  tests  were  run with standard delay time between the requests\n     (100ms),  but  also  with  a delay of 1ms. The tests applies to all\n     TANDBERG  products (T500, T880, T1000, T2500, T6000 and T8000). The\n     software  tested  on these products were B4.0 (our latest software)\n     and no problems were found when running the test suite. \n\nAppendix B. - References\n         1. http://www.ee.oulu.fi/research/ouspg/protos/\n         2. http://www.kb.cert.org/vuls/id/854306\n         3. http://www.kb.cert.org/vuls/id/107186\n         4. http://www.cert.org/tech_tips/denial_of_service.html\n         5. http://www.ietf.org/rfc/rfc1067.txt\n         6. http://www.ietf.org/rfc/rfc1089.txt\n         7. http://www.ietf.org/rfc/rfc1140.txt\n         8. http://www.ietf.org/rfc/rfc1155.txt\n         9. http://www.ietf.org/rfc/rfc1156.txt\n        10. http://www.ietf.org/rfc/rfc1215.txt\n        11. http://www.ietf.org/rfc/rfc1270.txt\n        12. http://www.ietf.org/rfc/rfc1352.txt\n\nAppendix C. - Background Information\n\n     Background Information on the OUSPG\n\n       OUSPG  is an academic research group located at Oulu University in\n       Finland.  The  purpose  of this research group is to test software\n       for vulnerabilities. \n       History  has  shown  that  the  techniques  used by the OUSPG have\n       discovered a large number of previously undetected problems in the\n       products  and  protocols  they  have  tested.  In  2001, the OUSPG\n       produced a comprehensive test suite for evaluating implementations\n       of  the  Lightweight  Directory  Access Protocol (LDAP). This test\n       suite  was  developed with the strategy of abusing the protocol in\n       unsupported  and  unexpected  ways,  and  it was very effective in\n       uncovering  a  wide  variety  of  vulnerabilities  across  several\n       products.  This approach can reveal vulnerabilities that would not\n       manifest themselves under normal conditions. \n       After  completing  its  work  on  LDAP,  OUSPG  moved its focus to\n       SNMPv1.  As  with  LDAP,  they designed a custom test suite, began\n       testing   a   selection   of  products,  and  found  a  number  of\n       vulnerabilities.  Because  OUSPG\u0027s  work  on  LDAP  was similar in\n       procedure  to its current work on SNMP, you may wish to review the\n       LDAP  Test  Suite  and  CERT  Advisory  CA-2001-18, which outlined\n       results of application of the test suite. \n       In order to test the security of protocols like SNMPv1, the PROTOS\n       project  presents  a  server with a wide variety of sample packets\n       containing  unexpected  values  or  illegally formatted data. As a\n       member of the PROTOS project consortium, the OUSPG used the PROTOS\n       c06-snmpv1  test  suite  to  study  several implementations of the\n       SNMPv1  protocol. \n\n     Background Information on the Simple Network Management Protocol\n     \n       The  Simple Network Management Protocol (SNMP) is the most popular\n       protocol  in use to manage networked devices. SNMP was designed in\n       the late 80\u0027s to facilitate the exchange of management information\n       between  networked  devices, operating at the application layer of\n       the  ISO/OSI  model.  The SNMP protocol enables network and system\n       administrators  to  remotely  monitor and configure devices on the\n       network  (devices  such  as  switches  and  routers). Software and\n       firmware products designed for networks often make use of the SNMP\n       protocol.  SNMP  runs  on  a  multitude  of  devices and operating\n       systems, including, but not limited to,\n          + Core  Network  Devices (Routers, Switches, Hubs, Bridges, and\n            Wireless Network Access Points)\n          + Operating Systems\n          + Consumer  Broadband  Network  Devices  (Cable  Modems and DSL\n            Modems)\n          + Consumer Electronic Devices (Cameras and Image Scanners)\n          + Networked   Office  Equipment  (Printers,  Copiers,  and  FAX\n            Machines)\n          + Network and Systems Management/Diagnostic Frameworks (Network\n            Sniffers and Network Analyzers)\n          + Uninterruptible Power Supplies (UPS)\n          + Networked Medical Equipment (Imaging Units and Oscilloscopes)\n          + Manufacturing and Processing Equipment\n       The  SNMP  protocol  is  formally defined in RFC1157. Quoting from\n       that RFC:\n\n                Implicit  in the SNMP architectural model is a collection\n                of  network  management  stations  and  network elements. \n                Network    management    stations    execute   management\n                applications  which monitor and control network elements. \n                Network  elements  are  devices  such as hosts, gateways,\n                terminal  servers,  and  the  like, which have management\n                agents  responsible for performing the network management\n                functions  requested  by the network management stations. \n                The  Simple Network Management Protocol (SNMP) is used to\n                communicate  management  information  between the network\n                management   stations  and  the  agents  in  the  network\n                elements. \n\n       Additionally,   SNMP  is  discussed  in  a  number  of  other  RFC\n       documents:\n          + RFC 3000 Internet Official Protocol Standards\n          + RFC 1212 Concise MIB Definitions\n          + RFC  1213  Management Information Base for Network Management\n            of TCP/IP-based Internets: MIB-II\n          + RFC  1215  A  Convention  for Defining Traps for use with the\n            SNMP\n          + RFC 1270 SNMP Communications Services\n          + RFC  2570  Introduction to Version 3 of the Internet-standard\n            Network Management Framework\n          + RFC  2571  An  Architecture  for  Describing  SNMP Management\n            Frameworks\n          + RFC  2572  Message  Processing and Dispatching for the Simple\n            Network Management Protocol (SNMP)\n          + RFC 2573 SNMP Applications\n          + RFC 2574 User-based Security Model (USM) for version 3 of the\n            Simple Network Management Protocol (SNMPv3)\n          + RFC  2575  View-based  Access  Control  Model  (VACM) for the\n            Simple Network Management Protocol (SNMP)\n          + RFC  2576  Coexistence  between  Version  1,  Version  2, and\n            Version   3   of  the  Internet-standard  Network  Management\n            Framework\n         _____________________________________________________________\n\n       The  CERT  Coordination  Center  thanks the Oulu University Secure\n       Programming  Group  for reporting these vulnerabilities to us, for\n       providing  detailed  technical  analyses,  and for assisting us in\n       preparing  this  advisory.  We also thank Steven M. Bellovin (AT\u0026T\n       Labs  --  Research),  Wes Hardaker (Net-SNMP), Steve Moulton (SNMP\n       Research),  Tom Reddington (Bell Labs), Mike Duckett (Bell South),\n       Rob   Thomas,  Blue  Boar  (Thievco),  and  the  many  others  who\n       contributed to this document. \n         _____________________________________________________________\n\n       Feedback  on  this document can be directed to the authors, Ian A. \n       Finlay, Shawn V. Hernan, Jason A. Rafail, Chad Dougherty, Allen D. \n       Householder, Marty Lindner, and Art Manion. \n       __________________________________________________________________\n\n       This document is available from:\n       http://www.cert.org/advisories/CA-2002-03.html\n       __________________________________________________________________\n\n       CERT/CC Contact Information\n\n        Email: cert@cert.org\n                Phone: +1 412-268-7090 (24-hour hotline)\n                Fax: +1 412-268-6989\n                Postal address:\n                CERT Coordination Center\n                Software Engineering Institute\n                Carnegie Mellon University\n                Pittsburgh PA 15213-3890\n                U.S.A. \n\n       CERT/CC  personnel  answer  the  hotline  08:00-17:00 EST(GMT-5) /\n       EDT(GMT-4) Monday through Friday; they are on call for emergencies\n       during other hours, on U.S. holidays, and on weekends. \n       \n       Using encryption\n       We  strongly  urge  you  to  encrypt sensitive information sent by\n       email. Our public PGP key is available from\n        http://www.cert.org/CERT_PGP.key\n       If  you  prefer  to use DES, please call the CERT hotline for more\n       information. \n       \n       Getting  security information\n       CERT publications and other security information are available\n       from our web site\n        http://www.cert.org/\n       To   subscribe  to  the  CERT  mailing  list  for  advisories  and\n       bulletins, send email to majordomo@cert.org. Please include in the\n       body of your message\n       \n         subscribe cert-advisory\n       \n       * \"CERT\" and \"CERT Coordination Center\" are registered in the U.S. \n       Patent and Trademark Office. \n       __________________________________________________________________\n\n       NO WARRANTY\n       Any  material  furnished  by  Carnegie  Mellon  University and the\n       Software  Engineering  Institute is furnished on an \"as is\" basis. \n       Carnegie Mellon University makes no warranties of any kind, either\n       expressed  or  implied as to any matter including, but not limited\n       to,   warranty   of   fitness   for   a   particular   purpose  or\n       merchantability,  exclusivity  or results obtained from use of the\n       material. Carnegie Mellon University does not make any warranty of\n       any  kind  with  respect  to  freedom  from  patent, trademark, or\n       copyright infringement. \n         _____________________________________________________________\n\n       Conditions for use, disclaimers, and sponsorship information\n       Copyright 2002 Carnegie Mellon University. \n\nRevision History\n\n       February 12, 2002: Initial release\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 6.5.8\n\niQCVAwUBPGltxKCVPMXQI2HJAQGVeAQAuHtxGBsmU5HI6PtqhpZ1rkpV+Cq3ChIU\nR1FUz4Zi2vzklH8jdXd10KqwZAPhXTPazeguhRyLVSUprMlSKqcXg3BCkH/y4WAl\nQUZ1VnQXMnMrxIJO1fv0WW0pcyM4W0iQBl0kCIlawPcjCGVniOCOr+4CE0f923wr\nuZiMJ5f2SEo=\n=h42e\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      }
    ],
    "trust": 3.24
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4089",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "4132",
        "trust": 1.9
      },
      {
        "db": "BID",
        "id": "4732",
        "trust": 1.9
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570",
        "trust": 1.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#107186",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "4088",
        "trust": 0.8
      },
      {
        "db": "VULN-DEV",
        "id": "20020509 SAR -O EXPLOITATION PROCESS INFO.",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "8989",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "19990909 19 SCO 5.0.5+SKUNWARE98 BUFFER OVERFLOWS",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2002-SCO.17",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "25758",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "id": "VAR-200205-0149",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.42828385666666663
  },
  "last_update_date": "2023-12-18T12:47:42.364000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/4089"
      },
      {
        "trust": 1.7,
        "url": "http://www.ee.oulu.fi/research/ouspg/protos/"
      },
      {
        "trust": 1.7,
        "url": "http://www.cert.org/tech_tips/denial_of_service.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.ietf.org/rfc/rfc1215.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.ietf.org/rfc/rfc1270.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc3000.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc1212.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc1213.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2570.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2571.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2572.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2573.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2574.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2575.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.ietf.org/rfc/rfc2576.txt"
      },
      {
        "trust": 1.6,
        "url": "http://online.securityfocus.com/bid/4132"
      },
      {
        "trust": 1.6,
        "url": "http://online.securityfocus.com/bid/4732"
      },
      {
        "trust": 1.6,
        "url": "ftp://stage.caldera.com/pub/security/openserver/cssa-2002-sco.17/cssa-2002-sco.17.txt"
      },
      {
        "trust": 1.6,
        "url": "http://online.securityfocus.com/archive/1/27074"
      },
      {
        "trust": 1.6,
        "url": "http://www.iss.net/security_center/static/8989.php"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=vuln-dev\u0026m=102098949103708\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/4088"
      },
      {
        "trust": 0.7,
        "url": "http://www.cert.org/advisories/ca-2002-03.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=vuln-dev\u0026m=102098949103708\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f44605"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f42769"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f43365"
      },
      {
        "trust": 0.3,
        "url": "http://online.securityfocus.com/news/474"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-006.asp"
      },
      {
        "trust": 0.3,
        "url": "http://otn.oracle.com/deploy/security/pdf/snmp_2002_alert.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f46343"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-malformed-snmp-msgs-non-ios-pub.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/public/sw-center/sw-ios.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/707/cisco-malformed-snmp-msgs-pub.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1352.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.redhat.com/support/errata/rhsa-2001-163.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/tech_tips/snmp_faq.html"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/4.1.02/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://www.innerdive.com/products/ric/)"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/107186"
      },
      {
        "trust": 0.1,
        "url": "https://www.juniper.net."
      },
      {
        "trust": 0.1,
        "url": "http://sunsolve.sun.com/securitypatch."
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/854306"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/go/psirt/."
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/4.0.15/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1067.txt"
      },
      {
        "trust": 0.1,
        "url": "https://www.dartware.com)"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1140.txt"
      },
      {
        "trust": 0.1,
        "url": "http://itrc.hp.com"
      },
      {
        "trust": 0.1,
        "url": "http://www.sun.com/solstice/products/ent.agents/"
      },
      {
        "trust": 0.1,
        "url": "http://stage.caldera.com/support/security"
      },
      {
        "trust": 0.1,
        "url": "http://www.ee.oulu.fi/research/ouspg/)"
      },
      {
        "trust": 0.1,
        "url": "http://www.net-snmp.org/download/)."
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/cert_pgp.key"
      },
      {
        "trust": 0.1,
        "url": "http://www.ibm.com/software/lotus/support/)."
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/sa/4.0.15/relnotes.htm"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/"
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1156.txt"
      },
      {
        "trust": 0.1,
        "url": "http://support.novell.com/tools/csp/"
      },
      {
        "trust": 0.1,
        "url": "http://support.openview.hp.com/cpe/patches/"
      },
      {
        "trust": 0.1,
        "url": "https://www.covalent.net"
      },
      {
        "trust": 0.1,
        "url": "http://www.innerdive.com/products/mibscout/)"
      },
      {
        "trust": 0.1,
        "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/0100.h"
      },
      {
        "trust": 0.1,
        "url": "http://sunsolve.sun.com/security."
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1155.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.stonesoft.com/support/techcenter/"
      },
      {
        "trust": 0.1,
        "url": "http://www.sgi.com/support/security/."
      },
      {
        "trust": 0.1,
        "url": "http://www.ietf.org/rfc/rfc1089.txt"
      },
      {
        "trust": 0.1,
        "url": "http://download.cacheflow.com/release/ca/3.1.22/relnotes.htm"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      },
      {
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-01-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "date": "2002-05-13T00:00:00",
        "db": "BID",
        "id": "4732"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4089"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4132"
      },
      {
        "date": "2002-02-12T22:54:19",
        "db": "PACKETSTORM",
        "id": "25758"
      },
      {
        "date": "2002-05-01T04:00:00",
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#107186"
      },
      {
        "date": "2007-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#854306"
      },
      {
        "date": "2002-05-13T00:00:00",
        "db": "BID",
        "id": "4732"
      },
      {
        "date": "2009-07-11T10:56:00",
        "db": "BID",
        "id": "4089"
      },
      {
        "date": "2002-02-12T00:00:00",
        "db": "BID",
        "id": "4132"
      },
      {
        "date": "2016-10-18T02:06:04.880000",
        "db": "NVD",
        "id": "CVE-1999-1570"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "4732"
      },
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "BID",
        "id": "4132"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vulnerabilities in SNMPv1 trap handling",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#107186"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "4089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200205-001"
      }
    ],
    "trust": 0.9
  }
}

var-200307-0024
Vulnerability from variot

znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files. Because of this, a local attacker may be able to launch a symbolic link attack against sensitive files. GNU Gzip is a compression/decompression program of the GNU Project. znew in Gzip packets has an input validation error vulnerability. The vulnerability stems from the failure of the network system or product to properly validate the input data

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200307-0024",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "3.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "2.2"
      },
      {
        "model": "gzip",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "1.3.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.22"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.520"
      },
      {
        "model": "irix .19m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "irix .19f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.5"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.3"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.2"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3"
      },
      {
        "model": "gzip a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.23"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.3.5",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery credited to Paul Szabo.",
    "sources": [
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2003-0367",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 2.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2003-0367",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-7196",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2003-0367",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200307-013",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7196",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.  Because of this, a local attacker may be able to launch a symbolic link attack against sensitive files. GNU Gzip is a compression/decompression program of the GNU Project. znew in Gzip packets has an input validation error vulnerability. The vulnerability stems from the failure of the network system or product to properly validate the input data",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "7872",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-7196",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "id": "VAR-200307-0024",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:40:58.947000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "TLSA-2003-38",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/tlsa-2003-38.txt"
      },
      {
        "title": "TLSA-2003-38",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/tlsa-2003-38j.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/7872"
      },
      {
        "trust": 1.7,
        "url": "http://www.openpkg.org/security/openpkg-sa-2003.031-gzip.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.debian.org/security/2003/dsa-308"
      },
      {
        "trust": 1.7,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:068"
      },
      {
        "trust": 1.7,
        "url": "http://www.turbolinux.com/security/tlsa-2003-38.txt"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0367"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0367"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-07-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "date": "2003-06-11T00:00:00",
        "db": "BID",
        "id": "7872"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "date": "2003-07-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "date": "2003-07-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7196"
      },
      {
        "date": "2009-07-11T22:06:00",
        "db": "BID",
        "id": "7872"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      },
      {
        "date": "2019-05-23T14:04:52.373000",
        "db": "NVD",
        "id": "CVE-2003-0367"
      },
      {
        "date": "2019-05-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "7872"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "gzip include  znew Command improper temporary file creation vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000187"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200307-013"
      }
    ],
    "trust": 0.6
  }
}

var-200504-0292
Vulnerability from variot

Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The gzip utility is prone to a directory-traversal vulnerability. The issue occurs when gunzip is invoked on a malicious archive using the '-N' option. An archive containing an absolute path for a filename that contains '/' characters can cause the file to be written using the absolute path contained in the filename. A remote attacker may leverage this issue using a malicious archive to corrupt arbitrary files with the privileges of the user that is running the vulnerable software. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200505-05


                                        http://security.gentoo.org/

Severity: Normal Title: gzip: Multiple vulnerabilities Date: May 09, 2005 Bugs: #89946, #90626 ID: 200505-05


Synopsis

gzip contains multiple vulnerabilities potentially allowing an attacker to execute arbitrary commands. The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).

Impact

These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.

Workaround

There is no known workaround at this time.

Resolution

All gzip users should upgrade to the latest stable version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"

References

[ 1 ] CAN-2005-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758 [ 2 ] CAN-2005-0988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988 [ 3 ] CAN-2005-1228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200505-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0292",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "gnu",
        "version": "1.3.3"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0 (x86-64)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0 (x86-64)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "10"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (ws)"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "s8500 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "s8700 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.4"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "-stablepre122300",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.4"
      },
      {
        "model": "linux ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "network messaging",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2.1"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0.x"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "directory pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cosmicperl",
        "version": "10.0.3"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "appliance server hosting edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "5.0.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "s8500 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.03"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "-release-p7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-release-p32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "enterprise linux ws ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "ipcop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipcop",
        "version": "1.4.1"
      },
      {
        "model": "openpkg",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openpkg",
        "version": "2.2"
      },
      {
        "model": "s8710 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "integrated management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6.2"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.2"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "advanced linux environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.1"
      },
      {
        "model": "propack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "home",
        "scope": null,
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": "-stablepre2002-03-07",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "intuity lx",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "appliance server workgroup edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "advanced workstation for the itanium processor ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "-release-p8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "s8300 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "linux ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-release-p17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.4"
      },
      {
        "model": "alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "-release/alpha",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "secure enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.0"
      },
      {
        "model": "ipcop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipcop",
        "version": "1.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "integrated management",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "solaris 10.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "enterprise linux as ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cvlan",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "-release-p20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "-release-p38",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.0"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.2"
      },
      {
        "model": "-release-p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "ipcop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipcop",
        "version": "1.4.4"
      },
      {
        "model": "s8710 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "openpkg",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openpkg",
        "version": "2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "gzip a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.1.1"
      },
      {
        "model": "ipcop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipcop",
        "version": "1.4.5"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "current",
        "scope": null,
        "trust": 0.3,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "s8700 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "-release-p5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.3"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "gzip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.3.5"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "5.04"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "-stablepre050201",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "-release-p3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-release-p42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "converged communications server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "linux ia32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "4.1"
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "1.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "6.0"
      },
      {
        "model": "enterprise linux es ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.2"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.10"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "13290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ulf Harnhammar\u203b ulfh@update.uu.se\u203bImran Ghory\u203b imranghory@gmail.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-1228",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2005-1228",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-1228",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-671",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue \"..\" Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The gzip utility is prone to a directory-traversal vulnerability. The issue occurs when gunzip is invoked on a malicious archive using the \u0027-N\u0027 option. \nAn archive containing an absolute path for a filename that contains \u0027/\u0027 characters can cause the file to be written using the absolute path contained in the filename. \nA remote attacker may leverage this issue using a malicious archive to corrupt arbitrary files with the privileges of the user that is running the vulnerable software. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 200505-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n  Severity: Normal\n     Title: gzip: Multiple vulnerabilities\n      Date: May 09, 2005\n      Bugs: #89946, #90626\n        ID: 200505-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\ngzip contains multiple vulnerabilities potentially allowing an attacker\nto execute arbitrary commands. The zgrep utility improperly\nsanitizes arguments, which may come from an untrusted source\n(CAN-2005-0758). \n\nImpact\n======\n\nThese vulnerabilities could allow arbitrary command execution, changing\nthe permissions of arbitrary files, and installation of files to an\naribitrary location in the filesystem. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll gzip users should upgrade to the latest stable version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \"\u003e=app-arch/gzip-1.3.5-r6\"\n\nReferences\n==========\n\n  [ 1 ] CAN-2005-0758\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758\n  [ 2 ] CAN-2005-0988\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988\n  [ 3 ] CAN-2005-1228\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-200505-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "BID",
        "id": "13290"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-1228",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "15047",
        "trust": 2.4
      },
      {
        "db": "OSVDB",
        "id": "15721",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "18100",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "21253",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "22033",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-3101",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "19289",
        "trust": 1.6
      },
      {
        "db": "USCERT",
        "id": "TA06-214A",
        "trust": 1.6
      },
      {
        "db": "XF",
        "id": "20199",
        "trust": 1.4
      },
      {
        "db": "BID",
        "id": "13290",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "13582",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "12996",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20050420 GZIP DIRECTORY TRAVERSAL VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2005.58",
        "trust": 0.6
      },
      {
        "db": "SLACKWARE",
        "id": "SSA:2006-262",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:170",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:382",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA06-214A",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2005:357",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2006-08-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "101816",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-752",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "38412",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "13290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "id": "VAR-200504-0292",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4615448
  },
  "last_update_date": "2024-07-23T20:47:38.700000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "AXSA-2005-51:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=87"
      },
      {
        "title": "AXSA-2006-27:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=342"
      },
      {
        "title": "bzip2",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/bzip2.html"
      },
      {
        "title": "gzip",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/gzip.html"
      },
      {
        "title": "AXSA-2005-48:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=86"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-474.html"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-3"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2005/tlsa-2005-59.txt"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-357j.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-474j.html"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2005/tlsa-2005-59j.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/15047"
      },
      {
        "trust": 1.9,
        "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
      },
      {
        "trust": 1.9,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "trust": 1.9,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
      },
      {
        "trust": 1.6,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/19289"
      },
      {
        "trust": 1.6,
        "url": "http://www.osvdb.org/15721"
      },
      {
        "trust": 1.6,
        "url": "http://www.debian.org/security/2005/dsa-752"
      },
      {
        "trust": 1.6,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/22033"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/21253"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/18100"
      },
      {
        "trust": 1.6,
        "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.58/scosa-2005.58.txt"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/20199"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/3101"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11057"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a170"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a382"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-1228"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-1228"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/12996"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/13582"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/13290"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/3101"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=111402732406477\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:382"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:170"
      },
      {
        "trust": 0.3,
        "url": "http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://www.gzip.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=21\u0026mode=thread\u0026order=0\u0026thold=0"
      },
      {
        "trust": 0.3,
        "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/396397"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "http://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0988"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.0"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-200505-05.xml"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0988"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "13290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "13290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-04-20T00:00:00",
        "db": "BID",
        "id": "13290"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "date": "2005-07-02T00:59:07",
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "date": "2005-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-08-02T20:26:00",
        "db": "BID",
        "id": "13290"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      },
      {
        "date": "2017-10-11T01:30:05.717000",
        "db": "NVD",
        "id": "CVE-2005-1228"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "gzip of  zgrep Vulnerable to arbitrary command execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000230"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "path traversal",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-671"
      }
    ],
    "trust": 0.6
  }
}

var-200505-1436
Vulnerability from variot

zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The 'zgrep' utility is reportedly affected by an arbitrary command-execution vulnerability. An attacker may execute arbitrary commands through zgrep command arguments to potentially gain unauthorized access to the affected computer. Note that this issue poses a security threat only if the arguments originate from a malicious source. This issue affects zgrep 1.2.4; other versions may be affected as well.


Want a new IT Security job?

Vacant positions at Secunia: http://secunia.com/secunia_vacancies/


TITLE: gzip Directory Traversal Vulnerability

SECUNIA ADVISORY ID: SA15047

VERIFY ADVISORY: http://secunia.com/advisories/15047/

CRITICAL: Less critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: gzip 1.x http://secunia.com/product/4220/

DESCRIPTION: Ulf H\xe4rnhammar has reported a vulnerability in gzip, which potentially can be exploited by malicious people to compromise a user's system. This makes it possible to have a file extracted to an arbitrary location outside the current directory via directory traversal attacks.

The vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3, 1.3.4 and 1.3.5.

SOLUTION: Do not extract untrusted ".gz" files with the "-N" flag.

PROVIDED AND/OR DISCOVERED BY: Ulf H\xe4rnhammar


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200505-05


                                        http://security.gentoo.org/

Severity: Normal Title: gzip: Multiple vulnerabilities Date: May 09, 2005 Bugs: #89946, #90626 ID: 200505-05


Synopsis

gzip contains multiple vulnerabilities potentially allowing an attacker to execute arbitrary commands. The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).

Impact

These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.

Workaround

There is no known workaround at this time.

Resolution

All gzip users should upgrade to the latest stable version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"

References

[ 1 ] CAN-2005-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758 [ 2 ] CAN-2005-0988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988 [ 3 ] CAN-2005-1228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200505-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Publisher Name: OpenPKG GmbH Publisher Home: http://openpkg.com/

Advisory Id (public): OpenPKG-SA-2007.002 Advisory Type: OpenPKG Security Advisory (SA) Advisory Directory: http://openpkg.com/go/OpenPKG-SA Advisory Document: http://openpkg.com/go/OpenPKG-SA-2007.002 Advisory Published: 2007-01-05 21:58 UTC

Issue Id (internal): OpenPKG-SI-20070105.01 Issue First Created: 2007-01-05 Issue Last Modified: 2007-01-05 Issue Revision: 04


Subject Name: bzip2 Subject Summary: Compression Tool Subject Home: http://www.bzip.org/ Subject Versions: * <= 1.0.3

Vulnerability Id: CVE-2005-0953, CVE-2005-0758 Vulnerability Scope: global (not OpenPKG specific)

Attack Feasibility: run-time Attack Vector: local system Attack Impact: manipulation of data, arbitrary code execution

Description: Together with two portability and stability issues, two older security issues were fixed in the compression tool BZip2 [0], versions up to and including 1.0.3.

References: [0] http://www.bzip.org/


Primary Package Name: bzip2 Primary Package Home: http://openpkg.org/go/package/bzip2

Corrected Distribution: Corrected Branch: Corrected Package: OpenPKG Enterprise E1.0-SOLID bzip2-1.0.3-E1.0.1 OpenPKG Enterprise E1.0-SOLID openpkg-E1.0.2-E1.0.2 OpenPKG Community 2-STABLE-20061018 bzip2-1.0.4-2.20070105 OpenPKG Community 2-STABLE-20061018 openpkg-2.20070105-2.20070105 OpenPKG Community 2-STABLE bzip2-1.0.4-2.20070105 OpenPKG Community 2-STABLE openpkg-2.20070105-2.20070105 OpenPKG Community CURRENT bzip2-1.0.4-20070105 OpenPKG Community CURRENT openpkg-20070105-20070105


For security reasons, this document was digitally signed with the OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34) which you can download from http://openpkg.com/openpkg.com.pgp or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/. Follow the instructions at http://openpkg.com/security/signatures/ for more details on how to verify the integrity of this document.


-----BEGIN PGP SIGNATURE----- Comment: OpenPKG GmbH http://openpkg.com/

iD8DBQFFnrwRZwQuyWG3rjQRAgkdAJ9YBx7auj7ursOTj5M/78Kq3SlGlACfc0aV 2IRFnTk4CCJwa9FPgv1z7c0= =Iq2w -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-1436",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gzip",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "1.3.5"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "4.10"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "5.04"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0 (x86-64)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0 (x86-64)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "10 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "10"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (ws)"
      },
      {
        "model": "gzip",
        "scope": null,
        "trust": 0.6,
        "vendor": "gnu",
        "version": null
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "10.0"
      },
      {
        "model": "home",
        "scope": null,
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": "appliance server workgroup edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "appliance server hosting edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "1.0"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "3.0"
      },
      {
        "model": "secure linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.2"
      },
      {
        "model": "secure enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "trustix",
        "version": "2.0"
      },
      {
        "model": "propack sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "propack sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "propack",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "advanced linux environment",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.4"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "6.0"
      },
      {
        "model": "open server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "5.0.7"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "9.0"
      },
      {
        "model": "linux i686",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "fedora core3",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "fedora core2",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "fedora core1",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "enterprise linux ws ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "enterprise linux es ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3"
      },
      {
        "model": "enterprise linux as ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4.0"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "3.0"
      },
      {
        "model": "advanced workstation for the itanium processor ia64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "stable",
        "scope": null,
        "trust": 0.3,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": "e1.0-solid",
        "scope": null,
        "trust": 0.3,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": "current",
        "scope": null,
        "trust": 0.3,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": "2-stable-20061018",
        "scope": null,
        "trust": 0.3,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2006.0"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2006.0"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.2"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.2"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "multi network firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "2.0"
      },
      {
        "model": "corporate server x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "3.0"
      },
      {
        "model": "corporate server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "3.0"
      },
      {
        "model": "corporate server x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "2.1"
      },
      {
        "model": "corporate server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "2.1"
      },
      {
        "model": "zgrep a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "zgrep",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gnu",
        "version": "1.2.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.10"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.9"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.0"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "bzip2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bzip2",
        "version": "1.0.2"
      },
      {
        "model": "bzip2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bzip2",
        "version": "1.0.1"
      },
      {
        "model": "s8710 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8710 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8700 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8700 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8500 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8500 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "network messaging",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "modular messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "1.1"
      },
      {
        "model": "intuity lx",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "integrated management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.1"
      },
      {
        "model": "integrated management",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "cvlan",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "converged communications server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "2.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.7"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "f5",
        "version": "4.5.13"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "13582"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "1.3.5",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0758",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": true,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.6,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2005-0758",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-0758",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-1008",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2005-0758",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue \"..\" Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The \u0027zgrep\u0027 utility is reportedly affected by an arbitrary command-execution vulnerability. \nAn attacker may execute arbitrary commands through zgrep command arguments to potentially gain unauthorized access to the affected computer. Note that this issue poses a security threat only if the arguments originate from a malicious source. \nThis issue affects zgrep 1.2.4; other versions may be affected as well. \n----------------------------------------------------------------------\n\nWant a new IT Security job?\n\nVacant positions at Secunia:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\ngzip Directory Traversal Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15047\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15047/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\ngzip 1.x\nhttp://secunia.com/product/4220/\n\nDESCRIPTION:\nUlf H\\xe4rnhammar has reported a vulnerability in gzip, which\npotentially can be exploited by malicious people to compromise a\nuser\u0027s system. This makes it\npossible to have a file extracted to an arbitrary location outside\nthe current directory via directory traversal attacks. \n\nThe vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3,\n1.3.4 and 1.3.5. \n\nSOLUTION:\nDo not extract untrusted \".gz\" files with the \"-N\" flag. \n\nPROVIDED AND/OR DISCOVERED BY:\nUlf H\\xe4rnhammar\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 200505-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n  Severity: Normal\n     Title: gzip: Multiple vulnerabilities\n      Date: May 09, 2005\n      Bugs: #89946, #90626\n        ID: 200505-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\ngzip contains multiple vulnerabilities potentially allowing an attacker\nto execute arbitrary commands. The zgrep utility improperly\nsanitizes arguments, which may come from an untrusted source\n(CAN-2005-0758). \n\nImpact\n======\n\nThese vulnerabilities could allow arbitrary command execution, changing\nthe permissions of arbitrary files, and installation of files to an\naribitrary location in the filesystem. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll gzip users should upgrade to the latest stable version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \"\u003e=app-arch/gzip-1.3.5-r6\"\n\nReferences\n==========\n\n  [ 1 ] CAN-2005-0758\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758\n  [ 2 ] CAN-2005-0988\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988\n  [ 3 ] CAN-2005-1228\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-200505-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n____________________________________________________________________________\n\nPublisher Name:          OpenPKG GmbH\nPublisher Home:          http://openpkg.com/\n\nAdvisory Id (public):    OpenPKG-SA-2007.002\nAdvisory Type:           OpenPKG Security Advisory (SA)\nAdvisory Directory:      http://openpkg.com/go/OpenPKG-SA\nAdvisory Document:       http://openpkg.com/go/OpenPKG-SA-2007.002\nAdvisory Published:      2007-01-05 21:58 UTC\n\nIssue Id (internal):     OpenPKG-SI-20070105.01\nIssue First Created:     2007-01-05\nIssue Last Modified:     2007-01-05\nIssue Revision:          04\n____________________________________________________________________________\n\nSubject Name:            bzip2\nSubject Summary:         Compression Tool\nSubject Home:            http://www.bzip.org/\nSubject Versions:        * \u003c= 1.0.3\n\nVulnerability Id:        CVE-2005-0953, CVE-2005-0758\nVulnerability Scope:     global (not OpenPKG specific)\n\nAttack Feasibility:      run-time\nAttack Vector:           local system\nAttack Impact:           manipulation of data, arbitrary code execution\n\nDescription:\n    Together with two portability and stability issues, two older\n    security issues were fixed in the compression tool BZip2 [0], versions\n    up to and including 1.0.3. \n\nReferences:\n    [0] http://www.bzip.org/\n____________________________________________________________________________\n\nPrimary Package Name:    bzip2\nPrimary Package Home:    http://openpkg.org/go/package/bzip2\n\nCorrected Distribution:  Corrected Branch: Corrected Package:\nOpenPKG Enterprise       E1.0-SOLID        bzip2-1.0.3-E1.0.1\nOpenPKG Enterprise       E1.0-SOLID        openpkg-E1.0.2-E1.0.2\nOpenPKG Community        2-STABLE-20061018 bzip2-1.0.4-2.20070105\nOpenPKG Community        2-STABLE-20061018 openpkg-2.20070105-2.20070105\nOpenPKG Community        2-STABLE          bzip2-1.0.4-2.20070105\nOpenPKG Community        2-STABLE          openpkg-2.20070105-2.20070105\nOpenPKG Community        CURRENT           bzip2-1.0.4-20070105\nOpenPKG Community        CURRENT           openpkg-20070105-20070105\n____________________________________________________________________________\n\nFor security reasons, this document was digitally signed with the\nOpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)\nwhich you can download from http://openpkg.com/openpkg.com.pgp\nor retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/. \nFollow the instructions at http://openpkg.com/security/signatures/\nfor more details on how to verify the integrity of this document. \n____________________________________________________________________________\n\n-----BEGIN PGP SIGNATURE-----\nComment: OpenPKG GmbH \u003chttp://openpkg.com/\u003e\n\niD8DBQFFnrwRZwQuyWG3rjQRAgkdAJ9YBx7auj7ursOTj5M/78Kq3SlGlACfc0aV\n2IRFnTk4CCJwa9FPgv1z7c0=\n=Iq2w\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "BID",
        "id": "13582"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "PACKETSTORM",
        "id": "53505"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-0758",
        "trust": 3.0
      },
      {
        "db": "BID",
        "id": "13582",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1013928",
        "trust": 1.9
      },
      {
        "db": "OSVDB",
        "id": "16371",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "25159",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "26235",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "22033",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "19183",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "18100",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-2732",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "15047",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "13290",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "12996",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "20199",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008",
        "trust": 0.6
      },
      {
        "db": "VUPEN",
        "id": "2007/2732",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0758",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "37396",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38412",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "53505",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "BID",
        "id": "13582"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "PACKETSTORM",
        "id": "53505"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "id": "VAR-200505-1436",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4615448
  },
  "last_update_date": "2024-07-23T20:50:25.579000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "AXSA-2005-51:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=87"
      },
      {
        "title": "AXSA-2006-27:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=342"
      },
      {
        "title": "bzip2",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/bzip2.html"
      },
      {
        "title": "gzip",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/data/gzip.html"
      },
      {
        "title": "AXSA-2005-48:1",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=86"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-474.html"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
      },
      {
        "title": "101816",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-3"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2005/tlsa-2005-59.txt"
      },
      {
        "title": "RHSA-2005:357",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-357j.html"
      },
      {
        "title": "RHSA-2005:474",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-474j.html"
      },
      {
        "title": "TLSA-2005-59",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2005/tlsa-2005-59j.txt"
      },
      {
        "title": "Red Hat: bzip2 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-2005474 - security advisory"
      },
      {
        "title": "Red Hat: gzip security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-2005357 - security advisory"
      },
      {
        "title": "Ubuntu Security Notice: gzip vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-158-1"
      },
      {
        "title": "Ubuntu Security Notice: bzip2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-161-1"
      },
      {
        "title": "phonito-scanner-action",
        "trust": 0.1,
        "url": "https://github.com/phonito/phonito-scanner-action "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.securityfocus.com/bid/13582"
      },
      {
        "trust": 2.0,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-357.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"
      },
      {
        "trust": 1.7,
        "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626"
      },
      {
        "trust": 1.7,
        "url": "http://www.fedoralegacy.org/updates/fc2/2005-11-14-flsa_2005_158801__updated_bzip2_packages_fix_security_issues.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/18100"
      },
      {
        "trust": 1.7,
        "url": "http://www.ubuntu.com/usn/usn-158-1"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/16371"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1013928"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2005-474.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/19183"
      },
      {
        "trust": 1.7,
        "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/22033"
      },
      {
        "trust": 1.7,
        "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2007.002.html"
      },
      {
        "trust": 1.7,
        "url": "http://docs.info.apple.com/article.html?artnum=306172"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce//2007/jul/msg00004.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:026"
      },
      {
        "trust": 1.7,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:027"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/25159"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26235"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2007/2732"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9797"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1107"
      },
      {
        "trust": 1.7,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1081"
      },
      {
        "trust": 1.1,
        "url": "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.58/scosa-2005.58.txt"
      },
      {
        "trust": 1.1,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.u.asc"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0758"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/20199"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0758"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/15047"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/13290"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/12996"
      },
      {
        "trust": 0.6,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-474.html"
      },
      {
        "trust": 0.3,
        "url": "http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://www.securitytracker.com/alerts/2005/may/1013928.html"
      },
      {
        "trust": 0.3,
        "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2005:474"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/158-1/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4220/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/15047/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0758"
      },
      {
        "trust": 0.1,
        "url": "http://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0988"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.0"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1228"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-200505-05.xml"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0988"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/security/signatures/"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0953"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/go/openpkg-sa-2007.002"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/go/openpkg-sa"
      },
      {
        "trust": 0.1,
        "url": "http://www.bzip.org/"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.com/openpkg.com.pgp"
      },
      {
        "trust": 0.1,
        "url": "http://openpkg.org/go/package/bzip2"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "BID",
        "id": "13582"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "PACKETSTORM",
        "id": "53505"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "db": "BID",
        "id": "13582"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "db": "PACKETSTORM",
        "id": "53505"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-05-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "date": "2005-05-10T00:00:00",
        "db": "BID",
        "id": "13582"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "date": "2005-05-28T06:29:35",
        "db": "PACKETSTORM",
        "id": "37396"
      },
      {
        "date": "2005-07-02T00:59:07",
        "db": "PACKETSTORM",
        "id": "38412"
      },
      {
        "date": "2007-01-13T20:35:58",
        "db": "PACKETSTORM",
        "id": "53505"
      },
      {
        "date": "2005-05-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "date": "2005-05-13T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2005-0758"
      },
      {
        "date": "2007-08-01T20:25:00",
        "db": "BID",
        "id": "13582"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      },
      {
        "date": "2019-10-16T20:01:12.487000",
        "db": "NVD",
        "id": "CVE-2005-0758"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "gzip of  zgrep Vulnerable to arbitrary command execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000228"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-1008"
      }
    ],
    "trust": 0.6
  }
}

cve-2010-0001
Vulnerability from cvelistv5
Published
2010-01-29 18:00
Modified
2024-08-07 00:30
Severity ?
Summary
Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
References
http://secunia.com/advisories/38220third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/40655third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT4435x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/0185vdb-entry, x_refsource_VUPEN
http://ncompress.sourceforge.net/#statusx_refsource_CONFIRM
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083vendor-advisory, x_refsource_HP
http://www.ubuntu.com/usn/USN-889-1vendor-advisory, x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546vdb-entry, signature, x_refsource_OVAL
http://securitytracker.com/id?1023490vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2010/1872vdb-entry, x_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083vendor-advisory, x_refsource_HP
https://bugzilla.redhat.com/show_bug.cgi?id=554418x_refsource_CONFIRM
http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468fx_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://www.debian.org/security/2010/dsa-1974vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:020vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/40689third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/40551third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/38223third-party-advisory, x_refsource_SECUNIA
http://savannah.gnu.org/forum/forum.php?forum_id=6153x_refsource_CONFIRM
http://www.debian.org/security/2010/dsa-2074vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2010/1796vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2010-0061.htmlvendor-advisory, x_refsource_REDHAT
https://rhn.redhat.com/errata/RHSA-2010-0095.htmlvendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2010:019vendor-advisory, x_refsource_MANDRIVA
http://www.mandriva.com/security/advisories?name=MDVSA-2011:152vendor-advisory, x_refsource_MANDRIVA
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705x_refsource_CONFIRM
http://secunia.com/advisories/38225third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/38232third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/61869vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:47.036Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38220",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38220"
          },
          {
            "name": "40655",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40655"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4435"
          },
          {
            "name": "ADV-2010-0185",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0185"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ncompress.sourceforge.net/#status"
          },
          {
            "name": "SSRT100018",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
          },
          {
            "name": "USN-889-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-889-1"
          },
          {
            "name": "oval:org.mitre.oval:def:10546",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
          },
          {
            "name": "1023490",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023490"
          },
          {
            "name": "ADV-2010-1872",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1872"
          },
          {
            "name": "HPSBMA02554",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
          },
          {
            "name": "APPLE-SA-2010-11-10-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
          },
          {
            "name": "DSA-1974",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1974"
          },
          {
            "name": "MDVSA-2010:020",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
          },
          {
            "name": "40689",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40689"
          },
          {
            "name": "40551",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40551"
          },
          {
            "name": "oval:org.mitre.oval:def:7511",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
          },
          {
            "name": "38223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38223"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
          },
          {
            "name": "DSA-2074",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-2074"
          },
          {
            "name": "ADV-2010-1796",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1796"
          },
          {
            "name": "RHSA-2010:0061",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
          },
          {
            "name": "RHSA-2010:0095",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
          },
          {
            "name": "MDVSA-2010:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
          },
          {
            "name": "MDVSA-2011:152",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "38225",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38225"
          },
          {
            "name": "SUSE-SA:2010:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
          },
          {
            "name": "38232",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38232"
          },
          {
            "name": "61869",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/61869"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-01-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "38220",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38220"
        },
        {
          "name": "40655",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40655"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4435"
        },
        {
          "name": "ADV-2010-0185",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0185"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ncompress.sourceforge.net/#status"
        },
        {
          "name": "SSRT100018",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
        },
        {
          "name": "USN-889-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-889-1"
        },
        {
          "name": "oval:org.mitre.oval:def:10546",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
        },
        {
          "name": "1023490",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023490"
        },
        {
          "name": "ADV-2010-1872",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1872"
        },
        {
          "name": "HPSBMA02554",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
        },
        {
          "name": "APPLE-SA-2010-11-10-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
        },
        {
          "name": "DSA-1974",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1974"
        },
        {
          "name": "MDVSA-2010:020",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
        },
        {
          "name": "40689",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40689"
        },
        {
          "name": "40551",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40551"
        },
        {
          "name": "oval:org.mitre.oval:def:7511",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
        },
        {
          "name": "38223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38223"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
        },
        {
          "name": "DSA-2074",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-2074"
        },
        {
          "name": "ADV-2010-1796",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1796"
        },
        {
          "name": "RHSA-2010:0061",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
        },
        {
          "name": "RHSA-2010:0095",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
        },
        {
          "name": "MDVSA-2010:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
        },
        {
          "name": "MDVSA-2011:152",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "38225",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38225"
        },
        {
          "name": "SUSE-SA:2010:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
        },
        {
          "name": "38232",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38232"
        },
        {
          "name": "61869",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/61869"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-0001",
    "datePublished": "2010-01-29T18:00:00",
    "dateReserved": "2009-12-14T00:00:00",
    "dateUpdated": "2024-08-07T00:30:47.036Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0603
Vulnerability from cvelistv5
Published
2004-06-30 04:00
Modified
2024-08-08 00:24
Severity ?
Summary
gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.823Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
          },
          {
            "name": "gzip-gzexe-tmpfile(16506)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
          },
          {
            "name": "GLSA-200406-18",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
          },
          {
            "name": "10603",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10603"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
        },
        {
          "name": "gzip-gzexe-tmpfile(16506)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
        },
        {
          "name": "GLSA-200406-18",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
        },
        {
          "name": "10603",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10603"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0603",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=54890",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=54890"
            },
            {
              "name": "gzip-gzexe-tmpfile(16506)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16506"
            },
            {
              "name": "GLSA-200406-18",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200406-18.xml"
            },
            {
              "name": "10603",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10603"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0603",
    "datePublished": "2004-06-30T04:00:00",
    "dateReserved": "2004-06-29T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.823Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0970
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 00:38
Severity ?
Summary
The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files. NOTE: the znew vulnerability may overlap CVE-2003-0367.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/11288vdb-entry, x_refsource_BID
http://www.trustix.org/errata/2004/0050vendor-advisory, x_refsource_TRUSTIX
http://www.debian.org/security/2004/dsa-588vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/13131third-party-advisory, x_refsource_SECUNIA
http://www.zataz.net/adviso/ncompress-09052005.txtx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:38:59.919Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "script-temporary-file-overwrite(17583)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"
          },
          {
            "name": "11288",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11288"
          },
          {
            "name": "2004-0050",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2004/0050"
          },
          {
            "name": "DSA-588",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-588"
          },
          {
            "name": "13131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13131"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files.  NOTE: the znew vulnerability may overlap CVE-2003-0367."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "script-temporary-file-overwrite(17583)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"
        },
        {
          "name": "11288",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11288"
        },
        {
          "name": "2004-0050",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2004/0050"
        },
        {
          "name": "DSA-588",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-588"
        },
        {
          "name": "13131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13131"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0970",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files.  NOTE: the znew vulnerability may overlap CVE-2003-0367."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "script-temporary-file-overwrite(17583)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"
            },
            {
              "name": "11288",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11288"
            },
            {
              "name": "2004-0050",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2004/0050"
            },
            {
              "name": "DSA-588",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-588"
            },
            {
              "name": "13131",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13131"
            },
            {
              "name": "http://www.zataz.net/adviso/ncompress-09052005.txt",
              "refsource": "MISC",
              "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0970",
    "datePublished": "2004-10-20T04:00:00",
    "dateReserved": "2004-10-19T00:00:00",
    "dateUpdated": "2024-08-08T00:38:59.919Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2624
Vulnerability from cvelistv5
Published
2010-01-29 18:00
Modified
2024-08-07 05:59
Severity ?
Summary
The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:56.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4435"
          },
          {
            "name": "ADV-2010-0185",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0185"
          },
          {
            "name": "USN-889-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-889-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711"
          },
          {
            "name": "[bug-gzip] 20091002 gzip-1.3.13 released [major]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258"
          },
          {
            "name": "APPLE-SA-2010-11-10-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
          },
          {
            "name": "DSA-1974",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1974"
          },
          {
            "name": "MDVSA-2010:020",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2"
          },
          {
            "name": "38223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38223"
          },
          {
            "name": "38132",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38132"
          },
          {
            "name": "SUSE-SA:2010:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
          },
          {
            "name": "38232",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38232"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-11-18T10:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4435"
        },
        {
          "name": "ADV-2010-0185",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0185"
        },
        {
          "name": "USN-889-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-889-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711"
        },
        {
          "name": "[bug-gzip] 20091002 gzip-1.3.13 released [major]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258"
        },
        {
          "name": "APPLE-SA-2010-11-10-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
        },
        {
          "name": "DSA-1974",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1974"
        },
        {
          "name": "MDVSA-2010:020",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2"
        },
        {
          "name": "38223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38223"
        },
        {
          "name": "38132",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38132"
        },
        {
          "name": "SUSE-SA:2010:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
        },
        {
          "name": "38232",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38232"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2009-2624",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.apple.com/kb/HT4435",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4435"
            },
            {
              "name": "ADV-2010-0185",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0185"
            },
            {
              "name": "USN-889-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-889-1"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=514711",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711"
            },
            {
              "name": "[bug-gzip] 20091002 gzip-1.3.13 released [major]",
              "refsource": "MLIST",
              "url": "http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258"
            },
            {
              "name": "APPLE-SA-2010-11-10-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
            },
            {
              "name": "DSA-1974",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-1974"
            },
            {
              "name": "MDVSA-2010:020",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
            },
            {
              "name": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2",
              "refsource": "CONFIRM",
              "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2"
            },
            {
              "name": "38223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38223"
            },
            {
              "name": "38132",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38132"
            },
            {
              "name": "SUSE-SA:2010:008",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
            },
            {
              "name": "38232",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38232"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2009-2624",
    "datePublished": "2010-01-29T18:00:00",
    "dateReserved": "2009-07-28T00:00:00",
    "dateUpdated": "2024-08-07T05:59:56.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-1228
Vulnerability from cvelistv5
Published
2005-04-22 04:00
Modified
2024-08-07 21:44
Severity ?
Summary
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.
References
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255x_refsource_CONFIRM
http://www.osvdb.org/15721vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/20199vdb-entry, x_refsource_XF
http://secunia.com/advisories/22033third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3101vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/21253third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-752vendor-advisory, x_refsource_DEBIAN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1vendor-advisory, x_refsource_SUNALERT
http://rhn.redhat.com/errata/RHSA-2005-357.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/19289vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/15047third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057vdb-entry, signature, x_refsource_OVAL
http://marc.info/?l=bugtraq&m=111402732406477&w=2mailing-list, x_refsource_BUGTRAQ
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtvendor-advisory, x_refsource_SCO
http://secunia.com/advisories/18100third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852vendor-advisory, x_refsource_SLACKWARE
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:44:05.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2006-08-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
          },
          {
            "name": "15721",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/15721"
          },
          {
            "name": "gzip-n-directory-traversal(20199)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
          },
          {
            "name": "22033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22033"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "DSA-752",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-752"
          },
          {
            "name": "101816",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
          },
          {
            "name": "RHSA-2005:357",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "name": "TA06-214A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
          },
          {
            "name": "15047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15047"
          },
          {
            "name": "oval:org.mitre.oval:def:382",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"
          },
          {
            "name": "oval:org.mitre.oval:def:170",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"
          },
          {
            "name": "oval:org.mitre.oval:def:11057",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"
          },
          {
            "name": "20050420 gzip directory traversal vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
          },
          {
            "name": "SCOSA-2005.58",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
          },
          {
            "name": "18100",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18100"
          },
          {
            "name": "SSA:2006-262",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "APPLE-SA-2006-08-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
        },
        {
          "name": "15721",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/15721"
        },
        {
          "name": "gzip-n-directory-traversal(20199)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
        },
        {
          "name": "22033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22033"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "DSA-752",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-752"
        },
        {
          "name": "101816",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
        },
        {
          "name": "RHSA-2005:357",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "name": "TA06-214A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
        },
        {
          "name": "15047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15047"
        },
        {
          "name": "oval:org.mitre.oval:def:382",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"
        },
        {
          "name": "oval:org.mitre.oval:def:170",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"
        },
        {
          "name": "oval:org.mitre.oval:def:11057",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"
        },
        {
          "name": "20050420 gzip directory traversal vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
        },
        {
          "name": "SCOSA-2005.58",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
        },
        {
          "name": "18100",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18100"
        },
        {
          "name": "SSA:2006-262",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1228",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2006-08-01",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"
            },
            {
              "name": "15721",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/15721"
            },
            {
              "name": "gzip-n-directory-traversal(20199)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"
            },
            {
              "name": "22033",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22033"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "DSA-752",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-752"
            },
            {
              "name": "101816",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
            },
            {
              "name": "RHSA-2005:357",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "TA06-214A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
            },
            {
              "name": "15047",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15047"
            },
            {
              "name": "oval:org.mitre.oval:def:382",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"
            },
            {
              "name": "oval:org.mitre.oval:def:170",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"
            },
            {
              "name": "oval:org.mitre.oval:def:11057",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"
            },
            {
              "name": "20050420 gzip directory traversal vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2"
            },
            {
              "name": "SCOSA-2005.58",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
            },
            {
              "name": "18100",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18100"
            },
            {
              "name": "SSA:2006-262",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1228",
    "datePublished": "2005-04-22T04:00:00",
    "dateReserved": "2005-04-22T00:00:00",
    "dateUpdated": "2024-08-07T21:44:05.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0988
Vulnerability from cvelistv5
Published
2005-04-06 04:00
Modified
2024-08-07 21:35
Severity ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://secunia.com/advisories/22033third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3101vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/21253third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2005/dsa-752vendor-advisory, x_refsource_DEBIAN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1vendor-advisory, x_refsource_SUNALERT
http://rhn.redhat.com/errata/RHSA-2005-357.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/19289vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA06-214A.htmlthird-party-advisory, x_refsource_CERT
http://www.securityfocus.com/bid/12996vdb-entry, x_refsource_BID
http://www.osvdb.org/15487vdb-entry, x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169vdb-entry, signature, x_refsource_OVAL
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtvendor-advisory, x_refsource_SCO
http://secunia.com/advisories/18100third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852vendor-advisory, x_refsource_SLACKWARE
http://www.securityfocus.com/archive/1/394965mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:35:59.902Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2006-08-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
          },
          {
            "name": "22033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22033"
          },
          {
            "name": "ADV-2006-3101",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3101"
          },
          {
            "name": "21253",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21253"
          },
          {
            "name": "DSA-752",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-752"
          },
          {
            "name": "101816",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
          },
          {
            "name": "RHSA-2005:357",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
          },
          {
            "name": "19289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19289"
          },
          {
            "name": "TA06-214A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
          },
          {
            "name": "12996",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12996"
          },
          {
            "name": "15487",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/15487"
          },
          {
            "name": "oval:org.mitre.oval:def:765",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"
          },
          {
            "name": "oval:org.mitre.oval:def:10242",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"
          },
          {
            "name": "oval:org.mitre.oval:def:1169",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"
          },
          {
            "name": "SCOSA-2005.58",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
          },
          {
            "name": "18100",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18100"
          },
          {
            "name": "SSA:2006-262",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
          },
          {
            "name": "20050404 gzip TOCTOU file-permissions vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/394965"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "APPLE-SA-2006-08-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
        },
        {
          "name": "22033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22033"
        },
        {
          "name": "ADV-2006-3101",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3101"
        },
        {
          "name": "21253",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21253"
        },
        {
          "name": "DSA-752",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-752"
        },
        {
          "name": "101816",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
        },
        {
          "name": "RHSA-2005:357",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
        },
        {
          "name": "19289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19289"
        },
        {
          "name": "TA06-214A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
        },
        {
          "name": "12996",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12996"
        },
        {
          "name": "15487",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/15487"
        },
        {
          "name": "oval:org.mitre.oval:def:765",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"
        },
        {
          "name": "oval:org.mitre.oval:def:10242",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"
        },
        {
          "name": "oval:org.mitre.oval:def:1169",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"
        },
        {
          "name": "SCOSA-2005.58",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
        },
        {
          "name": "18100",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18100"
        },
        {
          "name": "SSA:2006-262",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
        },
        {
          "name": "20050404 gzip TOCTOU file-permissions vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/394965"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0988",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2006-08-01",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"
            },
            {
              "name": "22033",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22033"
            },
            {
              "name": "ADV-2006-3101",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3101"
            },
            {
              "name": "21253",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21253"
            },
            {
              "name": "DSA-752",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-752"
            },
            {
              "name": "101816",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"
            },
            {
              "name": "RHSA-2005:357",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
            },
            {
              "name": "19289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19289"
            },
            {
              "name": "TA06-214A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html"
            },
            {
              "name": "12996",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12996"
            },
            {
              "name": "15487",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/15487"
            },
            {
              "name": "oval:org.mitre.oval:def:765",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"
            },
            {
              "name": "oval:org.mitre.oval:def:10242",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"
            },
            {
              "name": "oval:org.mitre.oval:def:1169",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"
            },
            {
              "name": "SCOSA-2005.58",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
            },
            {
              "name": "18100",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18100"
            },
            {
              "name": "SSA:2006-262",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
            },
            {
              "name": "20050404 gzip TOCTOU file-permissions vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/394965"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0988",
    "datePublished": "2005-04-06T04:00:00",
    "dateReserved": "2005-04-06T00:00:00",
    "dateUpdated": "2024-08-07T21:35:59.902Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-1349
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "solaris-gzip-modify-privileges(17577)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17577"
          },
          {
            "name": "57600",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1\u0026searchclause=security"
          },
          {
            "name": "VU#635998",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/635998"
          },
          {
            "name": "oval:org.mitre.oval:def:1654",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654"
          },
          {
            "name": "11318",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11318"
          },
          {
            "name": "12744",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12744"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "solaris-gzip-modify-privileges(17577)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17577"
        },
        {
          "name": "57600",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1\u0026searchclause=security"
        },
        {
          "name": "VU#635998",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/635998"
        },
        {
          "name": "oval:org.mitre.oval:def:1654",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654"
        },
        {
          "name": "11318",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11318"
        },
        {
          "name": "12744",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12744"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1349",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "solaris-gzip-modify-privileges(17577)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17577"
            },
            {
              "name": "57600",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1\u0026searchclause=security"
            },
            {
              "name": "VU#635998",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/635998"
            },
            {
              "name": "oval:org.mitre.oval:def:1654",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654"
            },
            {
              "name": "11318",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11318"
            },
            {
              "name": "12744",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12744"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1349",
    "datePublished": "2005-01-19T05:00:00",
    "dateReserved": "2005-01-06T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-1271
Vulnerability from cvelistv5
Published
2022-08-31 15:33
Modified
2024-08-02 23:55
Severity ?
Summary
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:55:24.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
          },
          {
            "name": "GLSA-202209-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-01"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "gzip, xz-utils",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Fixed in gzip 1.12"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-179",
              "description": "CWE-179 - Incorrect Behavior Order: Early Validation, CWE-1173 Improper Use of Validation Framework",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-30T15:06:11",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
        },
        {
          "name": "GLSA-202209-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202209-01"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2022-1271",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "gzip, xz-utils",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Fixed in gzip 1.12"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-179 - Incorrect Behavior Order: Early Validation, CWE-1173 Improper Use of Validation Framework"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
            },
            {
              "name": "https://www.openwall.com/lists/oss-security/2022/04/07/8",
              "refsource": "MISC",
              "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
            },
            {
              "name": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html",
              "refsource": "MISC",
              "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
            },
            {
              "name": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch",
              "refsource": "MISC",
              "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
            },
            {
              "name": "https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6",
              "refsource": "MISC",
              "url": "https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
            },
            {
              "name": "https://security-tracker.debian.org/tracker/CVE-2022-1271",
              "refsource": "MISC",
              "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
            },
            {
              "name": "https://access.redhat.com/security/cve/CVE-2022-1271",
              "refsource": "MISC",
              "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
            },
            {
              "name": "GLSA-202209-01",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202209-01"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20220930-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-1271",
    "datePublished": "2022-08-31T15:33:00",
    "dateReserved": "2022-04-07T00:00:00",
    "dateUpdated": "2024-08-02T23:55:24.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0367
Vulnerability from cvelistv5
Published
2003-06-10 04:00
Modified
2024-08-08 01:50
Severity ?
Summary
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:50:47.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "7872",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7872"
          },
          {
            "name": "TLSA-2003-38",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.com/security/TLSA-2003-38.txt"
          },
          {
            "name": "DSA-308",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-308"
          },
          {
            "name": "MDKSA-2003:068",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:068"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-06-20T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "7872",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7872"
        },
        {
          "name": "TLSA-2003-38",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.com/security/TLSA-2003-38.txt"
        },
        {
          "name": "DSA-308",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-308"
        },
        {
          "name": "MDKSA-2003:068",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:068"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "7872",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7872"
            },
            {
              "name": "TLSA-2003-38",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.com/security/TLSA-2003-38.txt"
            },
            {
              "name": "DSA-308",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-308"
            },
            {
              "name": "MDKSA-2003:068",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:068"
            },
            {
              "name": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html",
              "refsource": "CONFIRM",
              "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.031-gzip.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0367",
    "datePublished": "2003-06-10T04:00:00",
    "dateReserved": "2003-06-01T00:00:00",
    "dateUpdated": "2024-08-08T01:50:47.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0758
Vulnerability from cvelistv5
Published
2005-05-13 04:00
Modified
2024-08-07 21:28
Severity ?
Summary
zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.
References
http://www.ubuntu.com/usn/usn-158-1vendor-advisory, x_refsource_UBUNTU
http://www.osvdb.org/16371vdb-entry, x_refsource_OSVDB
http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2007/2732vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:027vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/22033third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2005-357.htmlvendor-advisory, x_refsource_REDHAT
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlvendor-advisory, x_refsource_APPLE
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.htmlvendor-advisory, x_refsource_OPENPKG
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/20539vdb-entry, x_refsource_XF
http://docs.info.apple.com/article.html?artnum=306172x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200505-05.xmlvendor-advisory, x_refsource_GENTOO
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtvendor-advisory, x_refsource_SCO
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.ascvendor-advisory, x_refsource_SGI
http://www.securityfocus.com/bid/25159vdb-entry, x_refsource_BID
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/13582vdb-entry, x_refsource_BID
http://secunia.com/advisories/18100third-party-advisory, x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/19183third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1013928vdb-entry, x_refsource_SECTRACK
http://www.mandriva.com/security/advisories?name=MDKSA-2006:026vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2005-474.htmlvendor-advisory, x_refsource_REDHAT
http://bugs.gentoo.org/show_bug.cgi?id=90626x_refsource_MISC
http://secunia.com/advisories/26235third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:27.167Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-158-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-158-1"
          },
          {
            "name": "16371",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/16371"
          },
          {
            "name": "FLSA:158801",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html"
          },
          {
            "name": "ADV-2007-2732",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2732"
          },
          {
            "name": "MDKSA-2006:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027"
          },
          {
            "name": "22033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22033"
          },
          {
            "name": "RHSA-2005:357",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
          },
          {
            "name": "APPLE-SA-2007-07-31",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
          },
          {
            "name": "OpenPKG-SA-2007.002",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9797",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797"
          },
          {
            "name": "oval:org.mitre.oval:def:1107",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107"
          },
          {
            "name": "gzip-zgrep-file-installation(20539)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=306172"
          },
          {
            "name": "GLSA-200505-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"
          },
          {
            "name": "SCOSA-2005.58",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
          },
          {
            "name": "20060301-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc"
          },
          {
            "name": "25159",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25159"
          },
          {
            "name": "oval:org.mitre.oval:def:1081",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081"
          },
          {
            "name": "13582",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/13582"
          },
          {
            "name": "18100",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18100"
          },
          {
            "name": "SSA:2006-262",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
          },
          {
            "name": "19183",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19183"
          },
          {
            "name": "1013928",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013928"
          },
          {
            "name": "MDKSA-2006:026",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026"
          },
          {
            "name": "RHSA-2005:474",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626"
          },
          {
            "name": "26235",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26235"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-158-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-158-1"
        },
        {
          "name": "16371",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/16371"
        },
        {
          "name": "FLSA:158801",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html"
        },
        {
          "name": "ADV-2007-2732",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2732"
        },
        {
          "name": "MDKSA-2006:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027"
        },
        {
          "name": "22033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22033"
        },
        {
          "name": "RHSA-2005:357",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html"
        },
        {
          "name": "APPLE-SA-2007-07-31",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
        },
        {
          "name": "OpenPKG-SA-2007.002",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9797",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797"
        },
        {
          "name": "oval:org.mitre.oval:def:1107",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107"
        },
        {
          "name": "gzip-zgrep-file-installation(20539)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=306172"
        },
        {
          "name": "GLSA-200505-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"
        },
        {
          "name": "SCOSA-2005.58",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"
        },
        {
          "name": "20060301-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc"
        },
        {
          "name": "25159",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25159"
        },
        {
          "name": "oval:org.mitre.oval:def:1081",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081"
        },
        {
          "name": "13582",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/13582"
        },
        {
          "name": "18100",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18100"
        },
        {
          "name": "SSA:2006-262",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852"
        },
        {
          "name": "19183",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19183"
        },
        {
          "name": "1013928",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013928"
        },
        {
          "name": "MDKSA-2006:026",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026"
        },
        {
          "name": "RHSA-2005:474",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626"
        },
        {
          "name": "26235",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26235"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-0758",
    "datePublished": "2005-05-13T04:00:00",
    "dateReserved": "2005-03-17T00:00:00",
    "dateUpdated": "2024-08-07T21:28:27.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1228
Vulnerability from cvelistv5
Published
2002-04-12 04:00
Modified
2024-08-08 04:51
Severity ?
Summary
Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.206Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20011230 gzip bug w/ patch..",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/247717"
          },
          {
            "name": "NetBSD-SA2002-002",
            "tags": [
              "vendor-advisory",
              "x_refsource_NETBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc"
          },
          {
            "name": "gzip-long-filename-bo(7882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7882.php"
          },
          {
            "name": "3712",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3712"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-08-17T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20011230 gzip bug w/ patch..",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/247717"
        },
        {
          "name": "NetBSD-SA2002-002",
          "tags": [
            "vendor-advisory",
            "x_refsource_NETBSD"
          ],
          "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc"
        },
        {
          "name": "gzip-long-filename-bo(7882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7882.php"
        },
        {
          "name": "3712",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3712"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1228",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20011230 gzip bug w/ patch..",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/247717"
            },
            {
              "name": "NetBSD-SA2002-002",
              "refsource": "NETBSD",
              "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc"
            },
            {
              "name": "gzip-long-filename-bo(7882)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7882.php"
            },
            {
              "name": "3712",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3712"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1228",
    "datePublished": "2002-04-12T04:00:00",
    "dateReserved": "2002-04-11T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.206Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}