Action not permitted
Modal body text goes here.
CVE-2005-0490
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0490", "datePublished": "2005-02-21T05:00:00", "dateReserved": "2005-02-21T00:00:00", "dateUpdated": "2024-08-07T21:13:54.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-0490\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2024-02-02T03:05:29.487\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.1},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-131\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE80B46-33F0-4338-AF37-9E7E31FC5E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:048\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_11_curl.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-340.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/12615\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/12616\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/19423\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]}]}}" } }
rhsa-2005_340
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated curl packages are now available.\n\nThis update has been rated as having low security impact by the\nRed Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and\nDict servers, using any of the supported protocols. cURL is designed\nto work without user interaction or any kind of interactivity. \n\nMultiple buffer overflow bugs were found in the way curl processes base64\nencoded replies. If a victim can be tricked into visiting a URL with curl,\na malicious web server could execute arbitrary code on a victim\u0027s machine.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0490 to this issue.\n\nAll users of curl are advised to upgrade to these updated\npackages, which contain backported fixes for these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:340", "url": "https://access.redhat.com/errata/RHSA-2005:340" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "149322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149322" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_340.json" } ], "title": "Red Hat Security Advisory: curl security update", "tracking": { "current_release_date": "2024-11-05T16:30:05+00:00", "generator": { "date": "2024-11-05T16:30:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:340", "initial_release_date": "2005-04-05T15:06:00+00:00", "revision_history": [ { "date": "2005-04-05T15:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-04-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:30:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.ia64", "product": { "name": "curl-0:7.12.1-5.rhel4.ia64", "product_id": "curl-0:7.12.1-5.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.ia64", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.ia64", "product_id": "curl-devel-0:7.12.1-5.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.ia64", "product": { "name": "curl-0:7.10.6-6.rhel3.ia64", "product_id": "curl-0:7.10.6-6.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.ia64", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.ia64", "product_id": "curl-devel-0:7.10.6-6.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.i386", "product": { "name": "curl-0:7.12.1-5.rhel4.i386", "product_id": "curl-0:7.12.1-5.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=i386" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=i386" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.i386", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.i386", "product_id": "curl-devel-0:7.12.1-5.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=i386" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.i386", "product": { "name": "curl-0:7.10.6-6.rhel3.i386", "product_id": "curl-0:7.10.6-6.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=i386" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=i386" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.i386", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.i386", "product_id": "curl-devel-0:7.10.6-6.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.src", "product": { "name": "curl-0:7.12.1-5.rhel4.src", "product_id": "curl-0:7.12.1-5.rhel4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=src" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.src", "product": { "name": "curl-0:7.10.6-6.rhel3.src", "product_id": "curl-0:7.10.6-6.rhel3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.x86_64", "product": { "name": "curl-0:7.12.1-5.rhel4.x86_64", "product_id": "curl-0:7.12.1-5.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.x86_64", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.x86_64", "product_id": "curl-devel-0:7.12.1-5.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.x86_64", "product": { "name": "curl-0:7.10.6-6.rhel3.x86_64", "product_id": "curl-0:7.10.6-6.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.x86_64", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.x86_64", "product_id": "curl-devel-0:7.10.6-6.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.ppc64", "product": { "name": "curl-0:7.12.1-5.rhel4.ppc64", "product_id": "curl-0:7.12.1-5.rhel4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=ppc64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=ppc64" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.ppc64", "product": { "name": "curl-0:7.10.6-6.rhel3.ppc64", "product_id": "curl-0:7.10.6-6.rhel3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=ppc64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.ppc", "product": { "name": "curl-0:7.12.1-5.rhel4.ppc", "product_id": "curl-0:7.12.1-5.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.ppc", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.ppc", "product_id": "curl-devel-0:7.12.1-5.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.ppc", "product": { "name": "curl-0:7.10.6-6.rhel3.ppc", "product_id": "curl-0:7.10.6-6.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.ppc", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.ppc", "product_id": "curl-devel-0:7.10.6-6.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.s390x", "product": { "name": "curl-0:7.12.1-5.rhel4.s390x", "product_id": "curl-0:7.12.1-5.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.s390x", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.s390x", "product_id": "curl-devel-0:7.12.1-5.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.s390x", "product": { "name": "curl-0:7.10.6-6.rhel3.s390x", "product_id": "curl-0:7.10.6-6.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.s390x", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.s390x", "product_id": "curl-devel-0:7.10.6-6.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-5.rhel4.s390", "product": { "name": "curl-0:7.12.1-5.rhel4.s390", "product_id": "curl-0:7.12.1-5.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-5.rhel4?arch=s390" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "product": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "product_id": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-5.rhel4?arch=s390" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-5.rhel4.s390", "product": { "name": "curl-devel-0:7.12.1-5.rhel4.s390", "product_id": "curl-devel-0:7.12.1-5.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-5.rhel4?arch=s390" } } }, { "category": "product_version", "name": "curl-0:7.10.6-6.rhel3.s390", "product": { "name": "curl-0:7.10.6-6.rhel3.s390", "product_id": "curl-0:7.10.6-6.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.10.6-6.rhel3?arch=s390" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "product": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "product_id": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.10.6-6.rhel3?arch=s390" } } }, { "category": "product_version", "name": "curl-devel-0:7.10.6-6.rhel3.s390", "product": { "name": "curl-devel-0:7.10.6-6.rhel3.s390", "product_id": "curl-devel-0:7.10.6-6.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.10.6-6.rhel3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.src" }, "product_reference": "curl-0:7.10.6-6.rhel3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:curl-devel-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.src" }, "product_reference": "curl-0:7.10.6-6.rhel3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:curl-devel-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.src" }, "product_reference": "curl-0:7.10.6-6.rhel3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-debuginfo-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:curl-devel-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.src" }, "product_reference": "curl-0:7.10.6-6.rhel3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.i386" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.ia64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.ppc" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.s390" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.s390x" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.10.6-6.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:curl-devel-0:7.10.6-6.rhel3.x86_64" }, "product_reference": "curl-devel-0:7.10.6-6.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.src" }, "product_reference": "curl-0:7.12.1-5.rhel4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.src" }, "product_reference": "curl-0:7.12.1-5.rhel4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.src" }, "product_reference": "curl-0:7.12.1-5.rhel4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.src" }, "product_reference": "curl-0:7.12.1-5.rhel4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.i386" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.ia64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.ppc" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.s390" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.s390x" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-5.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-5.rhel4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-5.rhel4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0490", "discovery_date": "2005-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617532" } ], "notes": [ { "category": "description", "text": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:curl-0:7.10.6-6.rhel3.i386", "3AS:curl-0:7.10.6-6.rhel3.ia64", "3AS:curl-0:7.10.6-6.rhel3.ppc", "3AS:curl-0:7.10.6-6.rhel3.ppc64", "3AS:curl-0:7.10.6-6.rhel3.s390", "3AS:curl-0:7.10.6-6.rhel3.s390x", "3AS:curl-0:7.10.6-6.rhel3.src", "3AS:curl-0:7.10.6-6.rhel3.x86_64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3AS:curl-devel-0:7.10.6-6.rhel3.i386", "3AS:curl-devel-0:7.10.6-6.rhel3.ia64", "3AS:curl-devel-0:7.10.6-6.rhel3.ppc", "3AS:curl-devel-0:7.10.6-6.rhel3.s390", "3AS:curl-devel-0:7.10.6-6.rhel3.s390x", "3AS:curl-devel-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-0:7.10.6-6.rhel3.i386", "3Desktop:curl-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-0:7.10.6-6.rhel3.ppc64", "3Desktop:curl-0:7.10.6-6.rhel3.s390", "3Desktop:curl-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-0:7.10.6-6.rhel3.src", "3Desktop:curl-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-devel-0:7.10.6-6.rhel3.i386", "3Desktop:curl-devel-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-devel-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390", "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-devel-0:7.10.6-6.rhel3.x86_64", "3ES:curl-0:7.10.6-6.rhel3.i386", "3ES:curl-0:7.10.6-6.rhel3.ia64", "3ES:curl-0:7.10.6-6.rhel3.ppc", "3ES:curl-0:7.10.6-6.rhel3.ppc64", "3ES:curl-0:7.10.6-6.rhel3.s390", "3ES:curl-0:7.10.6-6.rhel3.s390x", "3ES:curl-0:7.10.6-6.rhel3.src", "3ES:curl-0:7.10.6-6.rhel3.x86_64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3ES:curl-devel-0:7.10.6-6.rhel3.i386", "3ES:curl-devel-0:7.10.6-6.rhel3.ia64", "3ES:curl-devel-0:7.10.6-6.rhel3.ppc", "3ES:curl-devel-0:7.10.6-6.rhel3.s390", "3ES:curl-devel-0:7.10.6-6.rhel3.s390x", "3ES:curl-devel-0:7.10.6-6.rhel3.x86_64", "3WS:curl-0:7.10.6-6.rhel3.i386", "3WS:curl-0:7.10.6-6.rhel3.ia64", "3WS:curl-0:7.10.6-6.rhel3.ppc", "3WS:curl-0:7.10.6-6.rhel3.ppc64", "3WS:curl-0:7.10.6-6.rhel3.s390", "3WS:curl-0:7.10.6-6.rhel3.s390x", "3WS:curl-0:7.10.6-6.rhel3.src", "3WS:curl-0:7.10.6-6.rhel3.x86_64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3WS:curl-devel-0:7.10.6-6.rhel3.i386", "3WS:curl-devel-0:7.10.6-6.rhel3.ia64", "3WS:curl-devel-0:7.10.6-6.rhel3.ppc", "3WS:curl-devel-0:7.10.6-6.rhel3.s390", "3WS:curl-devel-0:7.10.6-6.rhel3.s390x", "3WS:curl-devel-0:7.10.6-6.rhel3.x86_64", "4AS:curl-0:7.12.1-5.rhel4.i386", "4AS:curl-0:7.12.1-5.rhel4.ia64", "4AS:curl-0:7.12.1-5.rhel4.ppc", "4AS:curl-0:7.12.1-5.rhel4.ppc64", "4AS:curl-0:7.12.1-5.rhel4.s390", "4AS:curl-0:7.12.1-5.rhel4.s390x", "4AS:curl-0:7.12.1-5.rhel4.src", "4AS:curl-0:7.12.1-5.rhel4.x86_64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4AS:curl-devel-0:7.12.1-5.rhel4.i386", "4AS:curl-devel-0:7.12.1-5.rhel4.ia64", "4AS:curl-devel-0:7.12.1-5.rhel4.ppc", "4AS:curl-devel-0:7.12.1-5.rhel4.s390", "4AS:curl-devel-0:7.12.1-5.rhel4.s390x", "4AS:curl-devel-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-0:7.12.1-5.rhel4.i386", "4Desktop:curl-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-0:7.12.1-5.rhel4.ppc64", "4Desktop:curl-0:7.12.1-5.rhel4.s390", "4Desktop:curl-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-0:7.12.1-5.rhel4.src", "4Desktop:curl-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-devel-0:7.12.1-5.rhel4.i386", "4Desktop:curl-devel-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-devel-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390", "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-devel-0:7.12.1-5.rhel4.x86_64", "4ES:curl-0:7.12.1-5.rhel4.i386", "4ES:curl-0:7.12.1-5.rhel4.ia64", "4ES:curl-0:7.12.1-5.rhel4.ppc", "4ES:curl-0:7.12.1-5.rhel4.ppc64", "4ES:curl-0:7.12.1-5.rhel4.s390", "4ES:curl-0:7.12.1-5.rhel4.s390x", "4ES:curl-0:7.12.1-5.rhel4.src", "4ES:curl-0:7.12.1-5.rhel4.x86_64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4ES:curl-devel-0:7.12.1-5.rhel4.i386", "4ES:curl-devel-0:7.12.1-5.rhel4.ia64", "4ES:curl-devel-0:7.12.1-5.rhel4.ppc", "4ES:curl-devel-0:7.12.1-5.rhel4.s390", "4ES:curl-devel-0:7.12.1-5.rhel4.s390x", "4ES:curl-devel-0:7.12.1-5.rhel4.x86_64", "4WS:curl-0:7.12.1-5.rhel4.i386", "4WS:curl-0:7.12.1-5.rhel4.ia64", "4WS:curl-0:7.12.1-5.rhel4.ppc", "4WS:curl-0:7.12.1-5.rhel4.ppc64", "4WS:curl-0:7.12.1-5.rhel4.s390", "4WS:curl-0:7.12.1-5.rhel4.s390x", "4WS:curl-0:7.12.1-5.rhel4.src", "4WS:curl-0:7.12.1-5.rhel4.x86_64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4WS:curl-devel-0:7.12.1-5.rhel4.i386", "4WS:curl-devel-0:7.12.1-5.rhel4.ia64", "4WS:curl-devel-0:7.12.1-5.rhel4.ppc", "4WS:curl-devel-0:7.12.1-5.rhel4.s390", "4WS:curl-devel-0:7.12.1-5.rhel4.s390x", "4WS:curl-devel-0:7.12.1-5.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0490" }, { "category": "external", "summary": "RHBZ#1617532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0490", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0490" } ], "release_date": "2005-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-05T15:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:curl-0:7.10.6-6.rhel3.i386", "3AS:curl-0:7.10.6-6.rhel3.ia64", "3AS:curl-0:7.10.6-6.rhel3.ppc", "3AS:curl-0:7.10.6-6.rhel3.ppc64", "3AS:curl-0:7.10.6-6.rhel3.s390", "3AS:curl-0:7.10.6-6.rhel3.s390x", "3AS:curl-0:7.10.6-6.rhel3.src", "3AS:curl-0:7.10.6-6.rhel3.x86_64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3AS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3AS:curl-devel-0:7.10.6-6.rhel3.i386", "3AS:curl-devel-0:7.10.6-6.rhel3.ia64", "3AS:curl-devel-0:7.10.6-6.rhel3.ppc", "3AS:curl-devel-0:7.10.6-6.rhel3.s390", "3AS:curl-devel-0:7.10.6-6.rhel3.s390x", "3AS:curl-devel-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-0:7.10.6-6.rhel3.i386", "3Desktop:curl-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-0:7.10.6-6.rhel3.ppc64", "3Desktop:curl-0:7.10.6-6.rhel3.s390", "3Desktop:curl-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-0:7.10.6-6.rhel3.src", "3Desktop:curl-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3Desktop:curl-devel-0:7.10.6-6.rhel3.i386", "3Desktop:curl-devel-0:7.10.6-6.rhel3.ia64", "3Desktop:curl-devel-0:7.10.6-6.rhel3.ppc", "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390", "3Desktop:curl-devel-0:7.10.6-6.rhel3.s390x", "3Desktop:curl-devel-0:7.10.6-6.rhel3.x86_64", "3ES:curl-0:7.10.6-6.rhel3.i386", "3ES:curl-0:7.10.6-6.rhel3.ia64", "3ES:curl-0:7.10.6-6.rhel3.ppc", "3ES:curl-0:7.10.6-6.rhel3.ppc64", "3ES:curl-0:7.10.6-6.rhel3.s390", "3ES:curl-0:7.10.6-6.rhel3.s390x", "3ES:curl-0:7.10.6-6.rhel3.src", "3ES:curl-0:7.10.6-6.rhel3.x86_64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3ES:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3ES:curl-devel-0:7.10.6-6.rhel3.i386", "3ES:curl-devel-0:7.10.6-6.rhel3.ia64", "3ES:curl-devel-0:7.10.6-6.rhel3.ppc", "3ES:curl-devel-0:7.10.6-6.rhel3.s390", "3ES:curl-devel-0:7.10.6-6.rhel3.s390x", "3ES:curl-devel-0:7.10.6-6.rhel3.x86_64", "3WS:curl-0:7.10.6-6.rhel3.i386", "3WS:curl-0:7.10.6-6.rhel3.ia64", "3WS:curl-0:7.10.6-6.rhel3.ppc", "3WS:curl-0:7.10.6-6.rhel3.ppc64", "3WS:curl-0:7.10.6-6.rhel3.s390", "3WS:curl-0:7.10.6-6.rhel3.s390x", "3WS:curl-0:7.10.6-6.rhel3.src", "3WS:curl-0:7.10.6-6.rhel3.x86_64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.i386", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ia64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.ppc64", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.s390x", "3WS:curl-debuginfo-0:7.10.6-6.rhel3.x86_64", "3WS:curl-devel-0:7.10.6-6.rhel3.i386", "3WS:curl-devel-0:7.10.6-6.rhel3.ia64", "3WS:curl-devel-0:7.10.6-6.rhel3.ppc", "3WS:curl-devel-0:7.10.6-6.rhel3.s390", "3WS:curl-devel-0:7.10.6-6.rhel3.s390x", "3WS:curl-devel-0:7.10.6-6.rhel3.x86_64", "4AS:curl-0:7.12.1-5.rhel4.i386", "4AS:curl-0:7.12.1-5.rhel4.ia64", "4AS:curl-0:7.12.1-5.rhel4.ppc", "4AS:curl-0:7.12.1-5.rhel4.ppc64", "4AS:curl-0:7.12.1-5.rhel4.s390", "4AS:curl-0:7.12.1-5.rhel4.s390x", "4AS:curl-0:7.12.1-5.rhel4.src", "4AS:curl-0:7.12.1-5.rhel4.x86_64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4AS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4AS:curl-devel-0:7.12.1-5.rhel4.i386", "4AS:curl-devel-0:7.12.1-5.rhel4.ia64", "4AS:curl-devel-0:7.12.1-5.rhel4.ppc", "4AS:curl-devel-0:7.12.1-5.rhel4.s390", "4AS:curl-devel-0:7.12.1-5.rhel4.s390x", "4AS:curl-devel-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-0:7.12.1-5.rhel4.i386", "4Desktop:curl-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-0:7.12.1-5.rhel4.ppc64", "4Desktop:curl-0:7.12.1-5.rhel4.s390", "4Desktop:curl-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-0:7.12.1-5.rhel4.src", "4Desktop:curl-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4Desktop:curl-devel-0:7.12.1-5.rhel4.i386", "4Desktop:curl-devel-0:7.12.1-5.rhel4.ia64", "4Desktop:curl-devel-0:7.12.1-5.rhel4.ppc", "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390", "4Desktop:curl-devel-0:7.12.1-5.rhel4.s390x", "4Desktop:curl-devel-0:7.12.1-5.rhel4.x86_64", "4ES:curl-0:7.12.1-5.rhel4.i386", "4ES:curl-0:7.12.1-5.rhel4.ia64", "4ES:curl-0:7.12.1-5.rhel4.ppc", "4ES:curl-0:7.12.1-5.rhel4.ppc64", "4ES:curl-0:7.12.1-5.rhel4.s390", "4ES:curl-0:7.12.1-5.rhel4.s390x", "4ES:curl-0:7.12.1-5.rhel4.src", "4ES:curl-0:7.12.1-5.rhel4.x86_64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4ES:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4ES:curl-devel-0:7.12.1-5.rhel4.i386", "4ES:curl-devel-0:7.12.1-5.rhel4.ia64", "4ES:curl-devel-0:7.12.1-5.rhel4.ppc", "4ES:curl-devel-0:7.12.1-5.rhel4.s390", "4ES:curl-devel-0:7.12.1-5.rhel4.s390x", "4ES:curl-devel-0:7.12.1-5.rhel4.x86_64", "4WS:curl-0:7.12.1-5.rhel4.i386", "4WS:curl-0:7.12.1-5.rhel4.ia64", "4WS:curl-0:7.12.1-5.rhel4.ppc", "4WS:curl-0:7.12.1-5.rhel4.ppc64", "4WS:curl-0:7.12.1-5.rhel4.s390", "4WS:curl-0:7.12.1-5.rhel4.s390x", "4WS:curl-0:7.12.1-5.rhel4.src", "4WS:curl-0:7.12.1-5.rhel4.x86_64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.i386", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ia64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.ppc64", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.s390x", "4WS:curl-debuginfo-0:7.12.1-5.rhel4.x86_64", "4WS:curl-devel-0:7.12.1-5.rhel4.i386", "4WS:curl-devel-0:7.12.1-5.rhel4.ia64", "4WS:curl-devel-0:7.12.1-5.rhel4.ppc", "4WS:curl-devel-0:7.12.1-5.rhel4.s390", "4WS:curl-devel-0:7.12.1-5.rhel4.s390x", "4WS:curl-devel-0:7.12.1-5.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:340" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
var-200505-0198
Vulnerability from variot
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. cURL/libcURL 7.13.0 Previously, Kerberos Authentication and NTLM from the site performing the authentication. It has been reported that cURL and libcURL are vulnerable to a remotely exploitable stack-based buffer overflow vulnerability. The cURL and libcURL NTML response processing code fails to ensure that a buffer overflow cannot occur when response data is decoded. The overflow occurs in the stack region, and remote code execution is possible if the saved instruction pointer is overwritten with a pointer to embedded instructions.
Background
curl is a command line tool for transferring files via many different protocols.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/curl < 7.13.1 >= 7.13.1
Description
curl fails to properly check boundaries when handling NTLM authentication.
Impact
With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.
Workaround
Disable NTLM authentication by not using the --anyauth or --ntlm options.
Resolution
All curl users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"
References
[ 1 ] CAN-2005-0490 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200503-20.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "libcurl", "scope": "eq", "trust": 1.0, "vendor": "haxx", "version": "7.12.1" }, { "model": "curl", "scope": "eq", "trust": 1.0, "vendor": "haxx", "version": "7.12.1" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "3 (ws)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "4 (as)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "4 (es)" }, { "model": "asianux server", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "3 (es)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "4 (ws)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "2.1 (ws)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "3 (as)" }, { "model": "turbolinux server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "2.1 (es)" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "2.1 (as)" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.4.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.2" }, { "model": "linux alt linux junior", "scope": "eq", "trust": 0.6, "vendor": "alt", "version": "2.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "10.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.6" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "10.0" }, { "model": "big-ip", "scope": "ne", "trust": 0.6, "vendor": "f5", "version": "4.5.13" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.13" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.3" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.12" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5" }, { "model": "big-ip", "scope": "ne", "trust": 0.6, "vendor": "f5", "version": "4.6.3" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.4" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.11.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "6.5.1" }, { "model": "3-dns", "scope": "ne", "trust": 0.6, "vendor": "f5", "version": "4.5.13" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.4" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.4" }, { "model": "3-dns", "scope": "ne", "trust": 0.6, "vendor": "f5", "version": "4.6.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "6.5.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.12.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.12.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.11" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.6.2" }, { "model": "propack", "scope": "eq", "trust": 0.6, "vendor": "sgi", "version": "3.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.2.1" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.6, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.12.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.7" }, { "model": "linux", "scope": null, "trust": 0.6, "vendor": "gentoo", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.6" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.12" }, { "model": "stenberg curl", "scope": "ne", "trust": 0.6, "vendor": "daniel", "version": "7.13.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.11" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "10.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.11" }, { "model": "3-dns", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.6.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.6" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.9" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.11.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.3" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.12" }, { "model": "corporate server", "scope": "eq", "trust": 0.6, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.6" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.10.4" }, { "model": "linux alt linux compact", "scope": "eq", "trust": 0.6, "vendor": "alt", "version": "2.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.1.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.6, "vendor": "mandriva", "version": "10.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.6, "vendor": "daniel", "version": "7.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "4.5.10" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "libcurl", "version": "7.12.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.5.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.7" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.4" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.5.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.6" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.7.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.7.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.4.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.4" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.6" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.7" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.8.1" }, { "model": "stenberg curl beta", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.9.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.7.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.6.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.0" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.8.2" } ], "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" }, { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "CNNVD", "id": "CNNVD-200505-184" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0490" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Credited to infamous41md[at]hotpop.com.", "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" } ], "trust": 0.6 }, "cve": "CVE-2005-0490", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2005-0490", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2005-0490", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2005-0490", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200505-184", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "CNNVD", "id": "CNNVD-200505-184" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. cURL/libcURL 7.13.0 Previously, Kerberos Authentication and NTLM from the site performing the authentication. It has been reported that cURL and libcURL are vulnerable to a remotely exploitable stack-based buffer overflow vulnerability. The cURL and libcURL NTML response processing code fails to ensure that a buffer overflow cannot occur when response data is decoded. \nThe overflow occurs in the stack region, and remote code execution is possible if the saved instruction pointer is overwritten with a pointer to embedded instructions. \n\nBackground\n==========\n\ncurl is a command line tool for transferring files via many different\nprotocols. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/curl \u003c 7.13.1 \u003e= 7.13.1\n\nDescription\n===========\n\ncurl fails to properly check boundaries when handling NTLM\nauthentication. \n\nImpact\n======\n\nWith a malicious server an attacker could send a carefully crafted NTLM\nresponse to a connecting client leading to the execution of arbitrary\ncode with the permissions of the user running curl. \n\nWorkaround\n==========\n\nDisable NTLM authentication by not using the --anyauth or --ntlm\noptions. \n\nResolution\n==========\n\nAll curl users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/curl-7.13.1\"\n\nReferences\n==========\n\n [ 1 ] CAN-2005-0490\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200503-20.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0490" }, { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" }, { "db": "PACKETSTORM", "id": "36663" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0490", "trust": 3.9 }, { "db": "BID", "id": "12616", "trust": 2.7 }, { "db": "BID", "id": "12615", "trust": 2.7 }, { "db": "SECUNIA", "id": "14364", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000134", "trust": 0.8 }, { "db": "GENTOO", "id": "GLSA-200503-20", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2005:048", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:340", "trust": 0.6 }, { "db": "IDEFENSE", "id": "20050221 MULTIPLE UNIX/LINUX VENDOR CURL/LIBCURL NTLM AUTHENTICATION BUFFER OVERFLOW VULNERABILITY", "trust": 0.6 }, { "db": "IDEFENSE", "id": "20050221 MULTIPLE UNIX/LINUX VENDOR CURL/LIBCURL KERBEROS AUTHENTICATION BUFFER OVERFLOW VULNERABILITY", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2005:011", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLA-2005:940", "trust": 0.6 }, { "db": "XF", "id": "19423", "trust": 0.6 }, { "db": "FULLDISC", "id": "20050228 [USN-86-1] CURL VULNERABILITY", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200505-184", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "36663", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" }, { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "PACKETSTORM", "id": "36663" }, { "db": "CNNVD", "id": "CNNVD-200505-184" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "id": "VAR-200505-0198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4615448 }, "last_update_date": "2024-02-27T22:53:51.996000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2005", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=185" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000134" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.0 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/12616" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/12615" }, { "trust": 1.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "trust": 1.6, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-340.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:048" }, { "trust": 1.0, "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10273" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0490" }, { "trust": 0.8, "url": "http://secunia.com/advisories/14364/" }, { "trust": 0.6, "url": "http://lists.altlinux.ru/pipermail/security-announce/2005-march/000287.html" }, { "trust": 0.6, "url": "http://curl.haxx.se/" }, { "trust": 0.6, "url": "http://curl.haxx.se/changes.html" }, { "trust": 0.6, "url": "http://www.f5.com/" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2005-340.html" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/19423" }, { "trust": 0.3, "url": "/archive/1/391041" }, { "trust": 0.3, "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?type=vulnerabilities\u0026id=202" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.0" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0490" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0490" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200503-20.xml" } ], "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" }, { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "PACKETSTORM", "id": "36663" }, { "db": "CNNVD", "id": "CNNVD-200505-184" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" }, { "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "db": "PACKETSTORM", "id": "36663" }, { "db": "CNNVD", "id": "CNNVD-200505-184" }, { "db": "NVD", "id": "CVE-2005-0490" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-02-22T00:00:00", "db": "BID", "id": "12616" }, { "date": "2005-02-22T00:00:00", "db": "BID", "id": "12615" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "date": "2005-03-22T05:24:05", "db": "PACKETSTORM", "id": "36663" }, { "date": "2005-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-184" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0490" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-08-24T17:54:00", "db": "BID", "id": "12616" }, { "date": "2006-08-24T17:54:00", "db": "BID", "id": "12615" }, { "date": "2024-02-27T05:23:00", "db": "JVNDB", "id": "JVNDB-2005-000134" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-184" }, { "date": "2024-02-02T03:05:29.487000", "db": "NVD", "id": "CVE-2005-0490" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cURL/libcURL\u00a0 of \u00a0Kerberos\u00a0 Authentication and \u00a0NTLM\u00a0 Buffer overflow vulnerability in authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000134" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "12616" }, { "db": "BID", "id": "12615" } ], "trust": 0.6 } }
gsd-2005-0490
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-0490", "description": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.", "id": "GSD-2005-0490", "references": [ "https://www.suse.com/security/cve/CVE-2005-0490.html", "https://access.redhat.com/errata/RHSA-2005:340" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-0490" ], "details": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.", "id": "GSD-2005-0490", "modified": "2023-12-13T01:20:08.208848Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050228 [USN-86-1] cURL vulnerability", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "name": "CLA-2005:940", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "name": "oval:org.mitre.oval:def:10273", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "name": "12616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12616" }, { "name": "12615", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12615" }, { "name": "curl-kerberos-bo(19423)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "name": "20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:048", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "name": "GLSA-200503-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "name": "RHSA-2005:340", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "name": "SUSE-SA:2005:011", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication." } ], "id": "CVE-2005-0490", "lastModified": "2024-02-02T03:05:29.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12615" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12616" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-131" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-7mv6-r5f6-w598
Vulnerability from github
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
{ "affected": [], "aliases": [ "CVE-2005-0490" ], "database_specific": { "cwe_ids": [ "CWE-131" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-05-02T04:00:00Z", "severity": "MODERATE" }, "details": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.", "id": "GHSA-7mv6-r5f6-w598", "modified": "2024-02-02T03:30:30Z", "published": "2022-05-01T01:49:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0490" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940" }, { "type": "WEB", "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml" }, { "type": "WEB", "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities" }, { "type": "WEB", "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12615" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12616" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.