CVE-1999-0009
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "refsource": "BID", "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0009", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-1999-0009\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"1998-04-08T04:00:00.000\",\"lastModified\":\"2018-10-30T16:26:22.357\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:data_general:dg_ux:5.4_3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDB1993-75C9-4738-BDB3-E4433AC202FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:data_general:dg_ux:5.4_3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB15FBD9-B4F8-42EF-92C2-8D70A2385E3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:data_general:dg_ux:5.4_4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA109D17-268F-4E8A-BBA9-0EAA6B46A705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:data_general:dg_ux:5.4_4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59EFCFC1-A15C-4B8D-BCCE-DB401A50D23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8257C916-6F4D-4B7E-8EED-B2789B3B35AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF8869C-2446-48F3-A1CD-70AE44D74EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199F4D8C-2FB9-4AF7-B7A3-339513665616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D0212C-EA41-4DF3-9A93-4559545BCD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3567046C-FE3F-424D-A1B0-D7A43D00B79F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40511481-CD42-4EB7-BE2A-7A78964B7D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D926CDA1-AF2B-4DED-93AE-8F12091E0B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B4722F-1FBA-4A73-BF85-5920B94F833D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FD1CEC-9064-483C-A3C2-04E3C50EFBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B1518A-9BBC-4CDB-8338-4DCC9A1A91D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C26983FB-6FD7-4938-8025-E535A6505ADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D01CD7-CE53-44D6-82C6-C72579BA089C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F04863-29CB-4E0C-838B-1C23E25C129C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79AA794C-C18F-48A4-ADCB-DC219DF259CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4B36C0-D3FF-4B33-B810-DB920062480B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03CED73-9451-4DE4-A00A-7EAB24424CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29446761-8ACE-4E05-82C3-3FF77C1E2CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B3C51E-DE28-4B50-B841-31CCFEA88A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67E6C0C-F5A4-4591-94B9-3D72221C0933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC66EB2-FFC7-4EF1-9591-A5C5E1E7C919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D02672-84E9-4036-8ED8-FE6EF4D7E275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646483C9-6FFC-46FE-B9CD-40D733FABFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B71C71-FA29-4B4C-831C-63AE2797BA2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333103D5-71B8-4DC1-90F7-15F2841955D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A889C10-0637-4133-AFBD-533C8397BE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E292DA15-91BF-4957-9C0F-A69518538BED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26144F94-63FD-4907-B548-09B68C2FC9B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26309EFA-0991-46B6-9818-F0FBB902D5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966C1A13-8007-408D-96BE-0DA3BB6CA401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D59247-56FA-46B4-BB51-2DAE71AFC145\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD254562-D74A-4D7C-B846-E242D785B830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFBCFEE-C24C-4D38-83F9-810E05D27901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766851E2-134A-4A89-931B-6F1753525684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC52A20-B706-432D-9A15-45F48EB1B08B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF25306-E7C2-4F9A-A809-4779A6C0A079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB038A89-1CA6-4313-B7CE-56C894945FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3BC86F-5718-4232-BFFF-6244A7C09B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6118CC1-6E51-4E1B-8F58-43B337515222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D3B348-270F-4209-B31A-2B40F5E4A601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D7C561-4D23-430B-A7D8-137E52B08FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11ACD012-F05F-45CD-A170-96CBAA42FFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF613C9-DC4A-45F0-BEE1-8450762B0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CEF2E-9687-4930-8536-B8B83018BD28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD3C82-0B7D-4B25-B603-AD6C6D59239A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CBA1B13-B378-4F13-BD13-EC58F15F5C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C8CAB1-2D8C-4875-A795-41178D48410F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9092D88-585D-4A0C-B181-E8D93563C74B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8211154-6685-4FF0-B3ED-43A5E5763A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F299301C-6BFC-436C-9CFD-2E291D3702AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD2701A-E930-4F4D-85F7-02F80135E34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:open_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1530468C-EDEF-431D-9164-B0D670AF07D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17439B5B-0B66-490B-9B53-2C9D576C879F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"200D8CB2-0D52-40A8-9CD9-6E4513605201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"54AF87E4-52A4-44CA-B48E-A5BB139E6410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F66BAF35-A8B9-4E95-B270-444206FDD35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34EBF074-78C8-41AF-88F1-DA6726E56F8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369207B4-96FA-4324-9445-98FAE8ECF5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A22D21-E0A9-4B56-86C7-805AD1A610D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B72953B-E873-4E44-A3CF-12D770A0D416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F847DB-65A9-47DA-BCFA-A179E5E2301A\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/134\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.