Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3192 (GCVE-0-2011-3192)
Vulnerability from cvelistv5 – Published: 2011-08-29 15:00 – Updated: 2024-08-06 23:29- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:55.461Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "45606",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45606"
},
{
"name": "RHSA-2011:1369",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1369.html"
},
{
"name": "RHSA-2011:1329",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1329.html"
},
{
"name": "HPSBUX02707",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"name": "SUSE-SU-2011:1010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html"
},
{
"name": "SSRT100966",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "openSUSE-SU-2011:0993",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.gossamer-threads.com/lists/apache/dev/401638"
},
{
"name": "1025960",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1025960"
},
{
"name": "[dev] 20110823 Re: DoS with mod_deflate \u0026 range requests",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html"
},
{
"name": "SSRT100624",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "17696",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/17696"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51714"
},
{
"name": "HPSBUX02702",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "46000",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/46000"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.oracle.com/security/entry/security_alert_for_cve_2011"
},
{
"name": "HPSBOV02822",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "SSRT100619",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "20110830 Apache HTTPd Range Header Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml"
},
{
"name": "USN-1199-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1199-1"
},
{
"name": "MDVSA-2011:130",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:130"
},
{
"name": "49303",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49303"
},
{
"name": "74721",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/74721"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "20110824 Re: Apache Killer",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:14824",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824"
},
{
"name": "[announce] 20110824 Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x \\(CVE-2011-3192\\)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e"
},
{
"name": "RHSA-2011:1330",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1330.html"
},
{
"name": "apache-http-byterange-dos(69396)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69396"
},
{
"name": "46126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/46126"
},
{
"name": "RHSA-2011:1245",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1245.html"
},
{
"name": "oval:org.mitre.oval:def:18827",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"name": "SSRT100626",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"name": "46125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/46125"
},
{
"name": "HPSBMU02766",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "VU#405811",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/405811"
},
{
"name": "20110820 Apache Killer",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2011/Aug/175"
},
{
"name": "SSRT100852",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "SUSE-SU-2011:1216",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html"
},
{
"name": "oval:org.mitre.oval:def:14762",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762"
},
{
"name": "SUSE-SU-2011:1007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html"
},
{
"name": "HPSBMU02776",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"name": "SUSE-SU-2011:1000",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html"
},
{
"name": "RHSA-2011:1294",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1294.html"
},
{
"name": "MDVSA-2013:150",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "SUSE-SU-2011:1229",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html"
},
{
"name": "HPSBMU02704",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "RHSA-2011:1300",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1300.html"
},
{
"name": "SSRT100606",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "45937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45937"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-08-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-06T10:09:46.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "45606",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45606"
},
{
"name": "RHSA-2011:1369",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1369.html"
},
{
"name": "RHSA-2011:1329",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1329.html"
},
{
"name": "HPSBUX02707",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"name": "SUSE-SU-2011:1010",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html"
},
{
"name": "SSRT100966",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "openSUSE-SU-2011:0993",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.gossamer-threads.com/lists/apache/dev/401638"
},
{
"name": "1025960",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1025960"
},
{
"name": "[dev] 20110823 Re: DoS with mod_deflate \u0026 range requests",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html"
},
{
"name": "SSRT100624",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "17696",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/17696"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51714"
},
{
"name": "HPSBUX02702",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "46000",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/46000"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.oracle.com/security/entry/security_alert_for_cve_2011"
},
{
"name": "HPSBOV02822",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "SSRT100619",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "20110830 Apache HTTPd Range Header Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml"
},
{
"name": "USN-1199-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1199-1"
},
{
"name": "MDVSA-2011:130",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:130"
},
{
"name": "49303",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49303"
},
{
"name": "74721",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/74721"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "20110824 Re: Apache Killer",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:14824",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824"
},
{
"name": "[announce] 20110824 Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x \\(CVE-2011-3192\\)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e"
},
{
"name": "RHSA-2011:1330",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1330.html"
},
{
"name": "apache-http-byterange-dos(69396)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69396"
},
{
"name": "46126",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/46126"
},
{
"name": "RHSA-2011:1245",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1245.html"
},
{
"name": "oval:org.mitre.oval:def:18827",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"name": "SSRT100626",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"name": "46125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/46125"
},
{
"name": "HPSBMU02766",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "VU#405811",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/405811"
},
{
"name": "20110820 Apache Killer",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2011/Aug/175"
},
{
"name": "SSRT100852",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "SUSE-SU-2011:1216",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html"
},
{
"name": "oval:org.mitre.oval:def:14762",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762"
},
{
"name": "SUSE-SU-2011:1007",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html"
},
{
"name": "HPSBMU02776",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"name": "SUSE-SU-2011:1000",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html"
},
{
"name": "RHSA-2011:1294",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1294.html"
},
{
"name": "MDVSA-2013:150",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "SUSE-SU-2011:1229",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html"
},
{
"name": "HPSBMU02704",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "RHSA-2011:1300",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1300.html"
},
{
"name": "SSRT100606",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "45937",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45937"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3192",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "45606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45606"
},
{
"name": "RHSA-2011:1369",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1369.html"
},
{
"name": "RHSA-2011:1329",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1329.html"
},
{
"name": "HPSBUX02707",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"name": "SUSE-SU-2011:1010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html"
},
{
"name": "SSRT100966",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "openSUSE-SU-2011:0993",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html"
},
{
"name": "http://www.gossamer-threads.com/lists/apache/dev/401638",
"refsource": "CONFIRM",
"url": "http://www.gossamer-threads.com/lists/apache/dev/401638"
},
{
"name": "1025960",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025960"
},
{
"name": "[dev] 20110823 Re: DoS with mod_deflate \u0026 range requests",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g@mail.gmail.com%3e"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732928",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html"
},
{
"name": "SSRT100624",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "17696",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17696"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51714",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51714"
},
{
"name": "HPSBUX02702",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "46000",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46000"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name": "http://blogs.oracle.com/security/entry/security_alert_for_cve_2011",
"refsource": "CONFIRM",
"url": "http://blogs.oracle.com/security/entry/security_alert_for_cve_2011"
},
{
"name": "HPSBOV02822",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2"
},
{
"name": "SSRT100619",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "20110830 Apache HTTPd Range Header Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml"
},
{
"name": "USN-1199-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1199-1"
},
{
"name": "MDVSA-2011:130",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:130"
},
{
"name": "49303",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49303"
},
{
"name": "74721",
"refsource": "OSVDB",
"url": "http://osvdb.org/74721"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "20110824 Re: Apache Killer",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:14824",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824"
},
{
"name": "[announce] 20110824 Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x \\(CVE-2011-3192\\)",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD@minotaur.apache.org%3e"
},
{
"name": "RHSA-2011:1330",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1330.html"
},
{
"name": "apache-http-byterange-dos(69396)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69396"
},
{
"name": "46126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46126"
},
{
"name": "RHSA-2011:1245",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1245.html"
},
{
"name": "oval:org.mitre.oval:def:18827",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "http://www.apache.org/dist/httpd/Announcement2.2.html",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"name": "SSRT100626",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"name": "46125",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46125"
},
{
"name": "HPSBMU02766",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2"
},
{
"name": "VU#405811",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/405811"
},
{
"name": "20110820 Apache Killer",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2011/Aug/175"
},
{
"name": "SSRT100852",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "SUSE-SU-2011:1216",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html"
},
{
"name": "oval:org.mitre.oval:def:14762",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762"
},
{
"name": "SUSE-SU-2011:1007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html"
},
{
"name": "HPSBMU02776",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2"
},
{
"name": "SUSE-SU-2011:1000",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html"
},
{
"name": "RHSA-2011:1294",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1294.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "SUSE-SU-2011:1229",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html"
},
{
"name": "HPSBMU02704",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2"
},
{
"name": "RHSA-2011:1300",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1300.html"
},
{
"name": "SSRT100606",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2"
},
{
"name": "45937",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45937"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-3192",
"datePublished": "2011-08-29T15:00:00.000Z",
"dateReserved": "2011-08-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:29:55.461Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-3192",
"date": "2026-05-22",
"epss": "0.90456",
"percentile": "0.99622"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0.35\", \"versionEndExcluding\": \"2.0.65\", \"matchCriteriaId\": \"E8032B39-37CC-4B9F-8D09-A0171E66BE47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.2.0\", \"versionEndExcluding\": \"2.2.20\", \"matchCriteriaId\": \"43A849EE-9D31-4289-84AF-E6831294297F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE554781-1EB9-446E-911F-6C11970C47F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*\", \"matchCriteriaId\": \"105187A7-2AFE-46F9-B0A9-F09C7E10BFBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*\", \"matchCriteriaId\": \"79A35457-EAA3-4BF9-A4DA-B2E414A75A02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*\", \"matchCriteriaId\": \"D1D7B467-58DD-45F1-9F1F-632620DF072A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*\", \"matchCriteriaId\": \"A44C3422-0D42-473E-ABB4-279D7494EE2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*\", \"matchCriteriaId\": \"A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DB8A616-865B-4E70-BA2E-BE5F0BA7A351\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"436EF2ED-FDBB-4B64-8EC4-33C3E4253F06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C91701-DF37-4F7B-AB9A-B1BFDB4991F8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"7EBFE35C-E243-43D1-883D-4398D71763CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.\"}, {\"lang\": \"es\", \"value\": \"El filtro byterange en el Servidor Apache HTTP v1.3.x, v2.0.x hasta v2.0.64, y v2.2.x hasta v2.2.19 permite a tacantes remotos provocar una denegaci\\u00f3n de servicio (consumo de memoria y CPU) a trav\\u00e9s de una cabecera Range que expresa m\\u00faltiple rangos de solapamiento, como se explot\\u00f3 en Agosto 2011, una vulnerabilidad diferente que CVE-2007-0086.\"}]",
"id": "CVE-2011-3192",
"lastModified": "2024-11-21T01:29:56.747",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-08-29T15:55:02.017",
"references": "[{\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://blogs.oracle.com/security/entry/security_alert_for_cve_2011\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Mailing List\"]}, {\"url\": \"http://osvdb.org/74721\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2011/Aug/175\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45606\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45937\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46000\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46125\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46126\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://securitytracker.com/id?1025960\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://support.apple.com/kb/HT5002\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.apache.org/dist/httpd/Announcement2.2.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/17696\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.gossamer-threads.com/lists/apache/dev/401638\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/405811\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:130\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1245.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1294.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1300.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1329.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1330.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1369.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/49303\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1199-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=732928\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/69396\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=51714\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://blogs.oracle.com/security/entry/security_alert_for_cve_2011\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\"]}, {\"url\": \"http://osvdb.org/74721\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2011/Aug/175\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45606\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46000\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46125\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://secunia.com/advisories/46126\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://securitytracker.com/id?1025960\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://support.apple.com/kb/HT5002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.apache.org/dist/httpd/Announcement2.2.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/17696\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.gossamer-threads.com/lists/apache/dev/401638\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/405811\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:130\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1245.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1294.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1300.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1329.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1330.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1369.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/49303\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1199-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=732928\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/69396\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=51714\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-3192\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-08-29T15:55:02.017\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.\"},{\"lang\":\"es\",\"value\":\"El filtro byterange en el Servidor Apache HTTP v1.3.x, v2.0.x hasta v2.0.64, y v2.2.x hasta v2.2.19 permite a tacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y CPU) a trav\u00e9s de una cabecera Range que expresa m\u00faltiple rangos de solapamiento, como se explot\u00f3 en Agosto 2011, una vulnerabilidad diferente que CVE-2007-0086.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.35\",\"versionEndExcluding\":\"2.0.65\",\"matchCriteriaId\":\"E8032B39-37CC-4B9F-8D09-A0171E66BE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.20\",\"matchCriteriaId\":\"43A849EE-9D31-4289-84AF-E6831294297F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:*\",\"matchCriteriaId\":\"105187A7-2AFE-46F9-B0A9-F09C7E10BFBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*\",\"matchCriteriaId\":\"79A35457-EAA3-4BF9-A4DA-B2E414A75A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*\",\"matchCriteriaId\":\"D1D7B467-58DD-45F1-9F1F-632620DF072A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*\",\"matchCriteriaId\":\"A44C3422-0D42-473E-ABB4-279D7494EE2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB8A616-865B-4E70-BA2E-BE5F0BA7A351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"436EF2ED-FDBB-4B64-8EC4-33C3E4253F06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C91701-DF37-4F7B-AB9A-B1BFDB4991F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blogs.oracle.com/security/entry/security_alert_for_cve_2011\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\"]},{\"url\":\"http://osvdb.org/74721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Aug/175\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45606\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45937\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46000\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46125\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46126\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://securitytracker.com/id?1025960\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apache.org/dist/httpd/Announcement2.2.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/17696\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.gossamer-threads.com/lists/apache/dev/401638\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/405811\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:130\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1245.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1294.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1300.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1329.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1330.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1369.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49303\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1199-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=732928\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69396\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=51714\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blogs.oracle.com/security/entry/security_alert_for_cve_2011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122D387DD%40minotaur.apache.org%3e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g%40mail.gmail.com%3e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131551295528105\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131731002122529\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132033751509019\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133477473521382\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\"]},{\"url\":\"http://osvdb.org/74721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Aug/175\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45606\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/46126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://securitytracker.com/id?1025960\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apache.org/dist/httpd/Announcement2.2.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b90d73.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/17696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.gossamer-threads.com/lists/apache/dev/401638\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/405811\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1245.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1294.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1300.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1329.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1330.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1369.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1199-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=732928\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=51714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2011:1294
Vulnerability from csaf_redhat - Published: 2011-09-14 18:59 - Updated: 2026-05-14 22:11The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.3 Long Life, 5.6 Extended Update Support, and\n6.0 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1294",
"url": "https://access.redhat.com/errata/RHSA-2011:1294"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1294.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2026-05-14T22:11:52+00:00",
"generator": {
"date": "2026-05-14T22:11:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2011:1294",
"initial_release_date": "2011-09-14T18:59:00+00:00",
"revision_history": [
{
"date": "2011-09-14T18:59:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-14T15:01:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:11:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:5.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.src",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.src",
"product_id": "httpd-0:2.2.3-45.el5_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.src",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.src",
"product_id": "httpd-0:2.2.3-22.el5_3.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.src",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.src",
"product_id": "httpd-0:2.2.15-5.el6_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product": {
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product_id": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.15-5.el6_0.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.src as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.src",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.src",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-14T18:59:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1294"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011:1300
Vulnerability from csaf_redhat - Published: 2011-09-15 17:42 - Updated: 2026-05-14 22:11The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-ELS:httpd-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-0:2.0.46-78.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-0:2.0.46-78.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Enterprise Linux 3 Extended Life Cycle Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1300",
"url": "https://access.redhat.com/errata/RHSA-2011:1300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1300.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2026-05-14T22:11:53+00:00",
"generator": {
"date": "2026-05-14T22:11:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2011:1300",
"initial_release_date": "2011-09-15T17:42:00+00:00",
"revision_history": [
{
"date": "2011-09-15T17:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-15T13:52:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:11:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.46-78.ent.src",
"product": {
"name": "httpd-0:2.0.46-78.ent.src",
"product_id": "httpd-0:2.0.46-78.ent.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-78.ent?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-0:2.0.46-78.ent.i386",
"product_id": "httpd-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-78.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-devel-0:2.0.46-78.ent.i386",
"product_id": "httpd-devel-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-78.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-78.ent.i386",
"product": {
"name": "mod_ssl-1:2.0.46-78.ent.i386",
"product_id": "mod_ssl-1:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-78.ent?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product_id": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-78.ent?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-0:2.0.46-78.ent.src"
},
"product_reference": "httpd-0:2.0.46-78.ent.src",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-0:2.0.46-78.ent.src"
},
"product_reference": "httpd-0:2.0.46-78.ent.src",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1300"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011:1329
Vulnerability from csaf_redhat - Published: 2011-09-21 19:50 - Updated: 2026-05-14 22:11The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd and httpd22 packages that fix one security issue are now\navailable for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise\nLinux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause the Apache HTTP\nServer to use an excessive amount of memory and CPU time via HTTP requests\nwith a specially-crafted Range header. (CVE-2011-3192)\n\nAll users of JBoss Enterprise Web Server 1.0.2 should upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAfter installing the updated packages, Red Hat Enterprise Linux 4 users\nmust restart the httpd22 service, and Red Hat Enterprise Linux 5 and 6\nusers must restart the httpd service, for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1329",
"url": "https://access.redhat.com/errata/RHSA-2011:1329"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1329.json"
}
],
"title": "Red Hat Security Advisory: httpd and httpd22 security update",
"tracking": {
"current_release_date": "2026-05-14T22:11:55+00:00",
"generator": {
"date": "2026-05-14T22:11:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2011:1329",
"initial_release_date": "2011-09-21T19:50:00+00:00",
"revision_history": [
{
"date": "2011-09-21T19:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-21T15:58:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:11:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product_id": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-16.ep5.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-14.1.ep5.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-13.2.ep5.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product_id": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-16.ep5.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product_id": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-14.1.ep5.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product_id": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-13.2.ep5.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-13.2.ep5.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.src",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-21T19:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1329"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011:1330
Vulnerability from csaf_redhat - Published: 2011-09-21 20:00 - Updated: 2026-05-14 22:11The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Web Server 1.0
Red Hat / Red Hat JBoss Web Server
|
cpe:/a:redhat:jboss_enterprise_web_server:1.0
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the Apache HTTP Server component for JBoss Enterprise Web\nServer 1.0.2 that fixes one security issue is now available from the Red\nHat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause the Apache HTTP\nServer to use an excessive amount of memory and CPU time via HTTP requests\nwith a specially-crafted Range header. (CVE-2011-3192)\n\nAll users of JBoss Enterprise Web Server 1.0.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1330",
"url": "https://access.redhat.com/errata/RHSA-2011:1330"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1330.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 security update",
"tracking": {
"current_release_date": "2026-05-14T22:11:57+00:00",
"generator": {
"date": "2026-05-14T22:11:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2011:1330",
"initial_release_date": "2011-09-21T20:00:00+00:00",
"revision_history": [
{
"date": "2011-09-21T20:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:43:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:11:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0",
"product": {
"name": "Red Hat JBoss Web Server 1.0",
"product_id": "Red Hat JBoss Web Server 1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-21T20:00:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Web Server 1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1330"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011:1369
Vulnerability from csaf_redhat - Published: 2011-10-13 19:33 - Updated: 2026-05-14 22:11The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-Stacks:httpd-0:2.2.13-3.el5s2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-0:2.2.13-3.el5s2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-0:2.2.13-3.el5s2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Application Stack v2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1369",
"url": "https://access.redhat.com/errata/RHSA-2011:1369"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1369.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2026-05-14T22:11:57+00:00",
"generator": {
"date": "2026-05-14T22:11:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2011:1369",
"initial_release_date": "2011-10-13T19:33:00+00:00",
"revision_history": [
{
"date": "2011-10-13T19:33:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-13T15:43:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:11:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product": {
"name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.13-3.el5s2.x86_64",
"product": {
"name": "httpd-manual-0:2.2.13-3.el5s2.x86_64",
"product_id": "httpd-manual-0:2.2.13-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.13-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.13-3.el5s2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.13-3.el5s2.x86_64",
"product_id": "httpd-devel-0:2.2.13-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.13-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.13-3.el5s2.x86_64",
"product": {
"name": "httpd-0:2.2.13-3.el5s2.x86_64",
"product_id": "httpd-0:2.2.13-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.13-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.13-3.el5s2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.13-3.el5s2.x86_64",
"product_id": "mod_ssl-1:2.2.13-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.13-3.el5s2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.13-3.el5s2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-devel-0:2.2.13-3.el5s2.i386",
"product": {
"name": "httpd-devel-0:2.2.13-3.el5s2.i386",
"product_id": "httpd-devel-0:2.2.13-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.13-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"product_id": "httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.13-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.13-3.el5s2.i386",
"product": {
"name": "httpd-manual-0:2.2.13-3.el5s2.i386",
"product_id": "httpd-manual-0:2.2.13-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.13-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.13-3.el5s2.i386",
"product": {
"name": "httpd-0:2.2.13-3.el5s2.i386",
"product_id": "httpd-0:2.2.13-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.13-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.13-3.el5s2.i386",
"product": {
"name": "mod_ssl-1:2.2.13-3.el5s2.i386",
"product_id": "mod_ssl-1:2.2.13-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.13-3.el5s2?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.13-3.el5s2.src",
"product": {
"name": "httpd-0:2.2.13-3.el5s2.src",
"product_id": "httpd-0:2.2.13-3.el5s2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.13-3.el5s2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.13-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.13-3.el5s2.i386"
},
"product_reference": "httpd-0:2.2.13-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.13-3.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.13-3.el5s2.src"
},
"product_reference": "httpd-0:2.2.13-3.el5s2.src",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.13-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.13-3.el5s2.x86_64"
},
"product_reference": "httpd-0:2.2.13-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.13-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.13-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.i386"
},
"product_reference": "httpd-devel-0:2.2.13-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.13-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.13-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.13-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.i386"
},
"product_reference": "httpd-manual-0:2.2.13-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.13-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.13-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.13-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.i386"
},
"product_reference": "mod_ssl-1:2.2.13-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.13-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.13-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-13T19:33:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1369"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.13-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.13-3.el5s2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011_1245
Vulnerability from csaf_redhat - Published: 2011-08-31 22:43 - Updated: 2024-11-22 04:38The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-debuginfo-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-devel-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-manual-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:httpd-suexec-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mod_ssl-1:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-debuginfo-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-devel-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-manual-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:httpd-suexec-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mod_ssl-1:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-debuginfo-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-devel-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-manual-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:httpd-suexec-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mod_ssl-1:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-debuginfo-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-devel-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-manual-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:httpd-suexec-0:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mod_ssl-1:2.0.52-48.ent.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-manual-0:2.2.15-9.el6_1.2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1245",
"url": "https://access.redhat.com/errata/RHSA-2011:1245"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1245.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2024-11-22T04:38:08+00:00",
"generator": {
"date": "2024-11-22T04:38:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1245",
"initial_release_date": "2011-08-31T22:43:00+00:00",
"revision_history": [
{
"date": "2011-08-31T22:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-08-31T18:44:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:38:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"product_id": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-53.el5_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"product_id": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-53.el5_7.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"product_id": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-9.el6_1.2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.x86_64",
"product_id": "mod_ssl-1:2.2.15-9.el6_1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-9.el6_1.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"product": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"product_id": "httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-9.el6_1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-9.el6_1.2.x86_64",
"product": {
"name": "httpd-0:2.2.15-9.el6_1.2.x86_64",
"product_id": "httpd-0:2.2.15-9.el6_1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-9.el6_1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.x86_64",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.x86_64",
"product_id": "mod_ssl-1:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.x86_64",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.x86_64",
"product_id": "httpd-manual-0:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"product_id": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.x86_64",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.x86_64",
"product_id": "httpd-devel-0:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.x86_64",
"product": {
"name": "httpd-0:2.0.52-48.ent.x86_64",
"product_id": "httpd-0:2.0.52-48.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"product": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"product_id": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-53.el5_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"product": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"product_id": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-53.el5_7.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.i386",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.i386",
"product_id": "httpd-0:2.2.3-53.el5_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.i386",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.i386",
"product_id": "mod_ssl-1:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.i386",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.i386",
"product_id": "httpd-manual-0:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.i386",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.i386",
"product_id": "httpd-suexec-0:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.i386",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.i386",
"product_id": "httpd-devel-0:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.i386",
"product": {
"name": "httpd-0:2.0.52-48.ent.i386",
"product_id": "httpd-0:2.0.52-48.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.src",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.src",
"product_id": "httpd-0:2.2.3-53.el5_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-9.el6_1.2.src",
"product": {
"name": "httpd-0:2.2.15-9.el6_1.2.src",
"product_id": "httpd-0:2.2.15-9.el6_1.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-9.el6_1.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.src",
"product": {
"name": "httpd-0:2.0.52-48.ent.src",
"product_id": "httpd-0:2.0.52-48.ent.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"product_id": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-53.el5_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"product_id": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-53.el5_7.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.ia64",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.ia64",
"product_id": "httpd-0:2.2.3-53.el5_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.ia64",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.ia64",
"product_id": "mod_ssl-1:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.ia64",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.ia64",
"product_id": "httpd-manual-0:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.ia64",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.ia64",
"product_id": "httpd-suexec-0:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.ia64",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.ia64",
"product_id": "httpd-devel-0:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.ia64",
"product": {
"name": "httpd-0:2.0.52-48.ent.ia64",
"product_id": "httpd-0:2.0.52-48.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"product": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"product_id": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-53.el5_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"product": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"product_id": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-53.el5_7.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.ppc",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.ppc",
"product_id": "httpd-0:2.2.3-53.el5_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.ppc",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.ppc",
"product_id": "mod_ssl-1:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.ppc",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.ppc",
"product_id": "httpd-manual-0:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.ppc",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.ppc",
"product_id": "httpd-suexec-0:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.ppc",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.ppc",
"product_id": "httpd-devel-0:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.ppc",
"product": {
"name": "httpd-0:2.0.52-48.ent.ppc",
"product_id": "httpd-0:2.0.52-48.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"product": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"product_id": "mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-9.el6_1.2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"product": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"product_id": "httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-9.el6_1.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-9.el6_1.2.ppc64",
"product": {
"name": "httpd-0:2.2.15-9.el6_1.2.ppc64",
"product_id": "httpd-0:2.2.15-9.el6_1.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-9.el6_1.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"product": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"product_id": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-53.el5_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"product": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"product_id": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-53.el5_7.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-53.el5_7.1.s390x",
"product": {
"name": "httpd-0:2.2.3-53.el5_7.1.s390x",
"product_id": "httpd-0:2.2.3-53.el5_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-53.el5_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"product": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"product_id": "mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-9.el6_1.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"product": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"product_id": "httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-9.el6_1.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-9.el6_1.2.s390x",
"product": {
"name": "httpd-0:2.2.15-9.el6_1.2.s390x",
"product_id": "httpd-0:2.2.15-9.el6_1.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-9.el6_1.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.s390x",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.s390x",
"product_id": "mod_ssl-1:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.s390x",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.s390x",
"product_id": "httpd-manual-0:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.s390x",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390x",
"product_id": "httpd-suexec-0:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.s390x",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.s390x",
"product_id": "httpd-devel-0:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.s390x",
"product": {
"name": "httpd-0:2.0.52-48.ent.s390x",
"product_id": "httpd-0:2.0.52-48.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"product_id": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-53.el5_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"product": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"product_id": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-53.el5_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-48.ent.s390",
"product": {
"name": "mod_ssl-1:2.0.52-48.ent.s390",
"product_id": "mod_ssl-1:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-48.ent?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"product": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"product_id": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-48.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-48.ent.s390",
"product": {
"name": "httpd-manual-0:2.0.52-48.ent.s390",
"product_id": "httpd-manual-0:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-48.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-48.ent.s390",
"product": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390",
"product_id": "httpd-suexec-0:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-48.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-48.ent.s390",
"product": {
"name": "httpd-devel-0:2.0.52-48.ent.s390",
"product_id": "httpd-devel-0:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-48.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-48.ent.s390",
"product": {
"name": "httpd-0:2.0.52-48.ent.s390",
"product_id": "httpd-0:2.0.52-48.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-48.ent?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-9.el6_1.2.i686",
"product": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.i686",
"product_id": "mod_ssl-1:2.2.15-9.el6_1.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-9.el6_1.2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-9.el6_1.2.i686",
"product": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.i686",
"product_id": "httpd-devel-0:2.2.15-9.el6_1.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-9.el6_1.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-9.el6_1.2.i686",
"product": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.i686",
"product_id": "httpd-tools-0:2.2.15-9.el6_1.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-9.el6_1.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-9.el6_1.2.i686",
"product": {
"name": "httpd-0:2.2.15-9.el6_1.2.i686",
"product_id": "httpd-0:2.2.15-9.el6_1.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-9.el6_1.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"product": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"product_id": "httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-9.el6_1.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"product": {
"name": "httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"product_id": "httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.15-9.el6_1.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.src"
},
"product_reference": "httpd-0:2.0.52-48.ent.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-48.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.src"
},
"product_reference": "httpd-0:2.0.52-48.ent.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-48.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.src"
},
"product_reference": "httpd-0:2.0.52-48.ent.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-48.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.src"
},
"product_reference": "httpd-0:2.0.52-48.ent.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-48.ent.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-48.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-48.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-48.ent.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-9.el6_1.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.i686"
},
"product_reference": "httpd-0:2.2.15-9.el6_1.2.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-9.el6_1.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.ppc64"
},
"product_reference": "httpd-0:2.2.15-9.el6_1.2.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-9.el6_1.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.s390x"
},
"product_reference": "httpd-0:2.2.15-9.el6_1.2.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-9.el6_1.2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.src"
},
"product_reference": "httpd-0:2.2.15-9.el6_1.2.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-9.el6_1.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.x86_64"
},
"product_reference": "httpd-0:2.2.15-9.el6_1.2.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.i686"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-9.el6_1.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-9.el6_1.2.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-manual-0:2.2.15-9.el6_1.2.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.i686"
},
"product_reference": "httpd-tools-0:2.2.15-9.el6_1.2.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-9.el6_1.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.i686"
},
"product_reference": "mod_ssl-1:2.2.15-9.el6_1.2.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-9.el6_1.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-9.el6_1.2.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:httpd-0:2.0.52-48.ent.i386",
"4AS:httpd-0:2.0.52-48.ent.ia64",
"4AS:httpd-0:2.0.52-48.ent.ppc",
"4AS:httpd-0:2.0.52-48.ent.s390",
"4AS:httpd-0:2.0.52-48.ent.s390x",
"4AS:httpd-0:2.0.52-48.ent.src",
"4AS:httpd-0:2.0.52-48.ent.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4AS:httpd-devel-0:2.0.52-48.ent.i386",
"4AS:httpd-devel-0:2.0.52-48.ent.ia64",
"4AS:httpd-devel-0:2.0.52-48.ent.ppc",
"4AS:httpd-devel-0:2.0.52-48.ent.s390",
"4AS:httpd-devel-0:2.0.52-48.ent.s390x",
"4AS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4AS:httpd-manual-0:2.0.52-48.ent.i386",
"4AS:httpd-manual-0:2.0.52-48.ent.ia64",
"4AS:httpd-manual-0:2.0.52-48.ent.ppc",
"4AS:httpd-manual-0:2.0.52-48.ent.s390",
"4AS:httpd-manual-0:2.0.52-48.ent.s390x",
"4AS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4AS:httpd-suexec-0:2.0.52-48.ent.i386",
"4AS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4AS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4AS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4AS:mod_ssl-1:2.0.52-48.ent.i386",
"4AS:mod_ssl-1:2.0.52-48.ent.ia64",
"4AS:mod_ssl-1:2.0.52-48.ent.ppc",
"4AS:mod_ssl-1:2.0.52-48.ent.s390",
"4AS:mod_ssl-1:2.0.52-48.ent.s390x",
"4AS:mod_ssl-1:2.0.52-48.ent.x86_64",
"4Desktop:httpd-0:2.0.52-48.ent.i386",
"4Desktop:httpd-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-0:2.0.52-48.ent.s390",
"4Desktop:httpd-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-0:2.0.52-48.ent.src",
"4Desktop:httpd-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.i386",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-devel-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.i386",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-manual-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.i386",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.i386",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ia64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ppc",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390x",
"4Desktop:mod_ssl-1:2.0.52-48.ent.x86_64",
"4ES:httpd-0:2.0.52-48.ent.i386",
"4ES:httpd-0:2.0.52-48.ent.ia64",
"4ES:httpd-0:2.0.52-48.ent.ppc",
"4ES:httpd-0:2.0.52-48.ent.s390",
"4ES:httpd-0:2.0.52-48.ent.s390x",
"4ES:httpd-0:2.0.52-48.ent.src",
"4ES:httpd-0:2.0.52-48.ent.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4ES:httpd-devel-0:2.0.52-48.ent.i386",
"4ES:httpd-devel-0:2.0.52-48.ent.ia64",
"4ES:httpd-devel-0:2.0.52-48.ent.ppc",
"4ES:httpd-devel-0:2.0.52-48.ent.s390",
"4ES:httpd-devel-0:2.0.52-48.ent.s390x",
"4ES:httpd-devel-0:2.0.52-48.ent.x86_64",
"4ES:httpd-manual-0:2.0.52-48.ent.i386",
"4ES:httpd-manual-0:2.0.52-48.ent.ia64",
"4ES:httpd-manual-0:2.0.52-48.ent.ppc",
"4ES:httpd-manual-0:2.0.52-48.ent.s390",
"4ES:httpd-manual-0:2.0.52-48.ent.s390x",
"4ES:httpd-manual-0:2.0.52-48.ent.x86_64",
"4ES:httpd-suexec-0:2.0.52-48.ent.i386",
"4ES:httpd-suexec-0:2.0.52-48.ent.ia64",
"4ES:httpd-suexec-0:2.0.52-48.ent.ppc",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390x",
"4ES:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4ES:mod_ssl-1:2.0.52-48.ent.i386",
"4ES:mod_ssl-1:2.0.52-48.ent.ia64",
"4ES:mod_ssl-1:2.0.52-48.ent.ppc",
"4ES:mod_ssl-1:2.0.52-48.ent.s390",
"4ES:mod_ssl-1:2.0.52-48.ent.s390x",
"4ES:mod_ssl-1:2.0.52-48.ent.x86_64",
"4WS:httpd-0:2.0.52-48.ent.i386",
"4WS:httpd-0:2.0.52-48.ent.ia64",
"4WS:httpd-0:2.0.52-48.ent.ppc",
"4WS:httpd-0:2.0.52-48.ent.s390",
"4WS:httpd-0:2.0.52-48.ent.s390x",
"4WS:httpd-0:2.0.52-48.ent.src",
"4WS:httpd-0:2.0.52-48.ent.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4WS:httpd-devel-0:2.0.52-48.ent.i386",
"4WS:httpd-devel-0:2.0.52-48.ent.ia64",
"4WS:httpd-devel-0:2.0.52-48.ent.ppc",
"4WS:httpd-devel-0:2.0.52-48.ent.s390",
"4WS:httpd-devel-0:2.0.52-48.ent.s390x",
"4WS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4WS:httpd-manual-0:2.0.52-48.ent.i386",
"4WS:httpd-manual-0:2.0.52-48.ent.ia64",
"4WS:httpd-manual-0:2.0.52-48.ent.ppc",
"4WS:httpd-manual-0:2.0.52-48.ent.s390",
"4WS:httpd-manual-0:2.0.52-48.ent.s390x",
"4WS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4WS:httpd-suexec-0:2.0.52-48.ent.i386",
"4WS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4WS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4WS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4WS:mod_ssl-1:2.0.52-48.ent.i386",
"4WS:mod_ssl-1:2.0.52-48.ent.ia64",
"4WS:mod_ssl-1:2.0.52-48.ent.ppc",
"4WS:mod_ssl-1:2.0.52-48.ent.s390",
"4WS:mod_ssl-1:2.0.52-48.ent.s390x",
"4WS:mod_ssl-1:2.0.52-48.ent.x86_64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.src",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-08-31T22:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:httpd-0:2.0.52-48.ent.i386",
"4AS:httpd-0:2.0.52-48.ent.ia64",
"4AS:httpd-0:2.0.52-48.ent.ppc",
"4AS:httpd-0:2.0.52-48.ent.s390",
"4AS:httpd-0:2.0.52-48.ent.s390x",
"4AS:httpd-0:2.0.52-48.ent.src",
"4AS:httpd-0:2.0.52-48.ent.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4AS:httpd-devel-0:2.0.52-48.ent.i386",
"4AS:httpd-devel-0:2.0.52-48.ent.ia64",
"4AS:httpd-devel-0:2.0.52-48.ent.ppc",
"4AS:httpd-devel-0:2.0.52-48.ent.s390",
"4AS:httpd-devel-0:2.0.52-48.ent.s390x",
"4AS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4AS:httpd-manual-0:2.0.52-48.ent.i386",
"4AS:httpd-manual-0:2.0.52-48.ent.ia64",
"4AS:httpd-manual-0:2.0.52-48.ent.ppc",
"4AS:httpd-manual-0:2.0.52-48.ent.s390",
"4AS:httpd-manual-0:2.0.52-48.ent.s390x",
"4AS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4AS:httpd-suexec-0:2.0.52-48.ent.i386",
"4AS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4AS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4AS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4AS:mod_ssl-1:2.0.52-48.ent.i386",
"4AS:mod_ssl-1:2.0.52-48.ent.ia64",
"4AS:mod_ssl-1:2.0.52-48.ent.ppc",
"4AS:mod_ssl-1:2.0.52-48.ent.s390",
"4AS:mod_ssl-1:2.0.52-48.ent.s390x",
"4AS:mod_ssl-1:2.0.52-48.ent.x86_64",
"4Desktop:httpd-0:2.0.52-48.ent.i386",
"4Desktop:httpd-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-0:2.0.52-48.ent.s390",
"4Desktop:httpd-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-0:2.0.52-48.ent.src",
"4Desktop:httpd-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.i386",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-devel-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.i386",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-manual-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.i386",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.i386",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ia64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ppc",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390x",
"4Desktop:mod_ssl-1:2.0.52-48.ent.x86_64",
"4ES:httpd-0:2.0.52-48.ent.i386",
"4ES:httpd-0:2.0.52-48.ent.ia64",
"4ES:httpd-0:2.0.52-48.ent.ppc",
"4ES:httpd-0:2.0.52-48.ent.s390",
"4ES:httpd-0:2.0.52-48.ent.s390x",
"4ES:httpd-0:2.0.52-48.ent.src",
"4ES:httpd-0:2.0.52-48.ent.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4ES:httpd-devel-0:2.0.52-48.ent.i386",
"4ES:httpd-devel-0:2.0.52-48.ent.ia64",
"4ES:httpd-devel-0:2.0.52-48.ent.ppc",
"4ES:httpd-devel-0:2.0.52-48.ent.s390",
"4ES:httpd-devel-0:2.0.52-48.ent.s390x",
"4ES:httpd-devel-0:2.0.52-48.ent.x86_64",
"4ES:httpd-manual-0:2.0.52-48.ent.i386",
"4ES:httpd-manual-0:2.0.52-48.ent.ia64",
"4ES:httpd-manual-0:2.0.52-48.ent.ppc",
"4ES:httpd-manual-0:2.0.52-48.ent.s390",
"4ES:httpd-manual-0:2.0.52-48.ent.s390x",
"4ES:httpd-manual-0:2.0.52-48.ent.x86_64",
"4ES:httpd-suexec-0:2.0.52-48.ent.i386",
"4ES:httpd-suexec-0:2.0.52-48.ent.ia64",
"4ES:httpd-suexec-0:2.0.52-48.ent.ppc",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390x",
"4ES:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4ES:mod_ssl-1:2.0.52-48.ent.i386",
"4ES:mod_ssl-1:2.0.52-48.ent.ia64",
"4ES:mod_ssl-1:2.0.52-48.ent.ppc",
"4ES:mod_ssl-1:2.0.52-48.ent.s390",
"4ES:mod_ssl-1:2.0.52-48.ent.s390x",
"4ES:mod_ssl-1:2.0.52-48.ent.x86_64",
"4WS:httpd-0:2.0.52-48.ent.i386",
"4WS:httpd-0:2.0.52-48.ent.ia64",
"4WS:httpd-0:2.0.52-48.ent.ppc",
"4WS:httpd-0:2.0.52-48.ent.s390",
"4WS:httpd-0:2.0.52-48.ent.s390x",
"4WS:httpd-0:2.0.52-48.ent.src",
"4WS:httpd-0:2.0.52-48.ent.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4WS:httpd-devel-0:2.0.52-48.ent.i386",
"4WS:httpd-devel-0:2.0.52-48.ent.ia64",
"4WS:httpd-devel-0:2.0.52-48.ent.ppc",
"4WS:httpd-devel-0:2.0.52-48.ent.s390",
"4WS:httpd-devel-0:2.0.52-48.ent.s390x",
"4WS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4WS:httpd-manual-0:2.0.52-48.ent.i386",
"4WS:httpd-manual-0:2.0.52-48.ent.ia64",
"4WS:httpd-manual-0:2.0.52-48.ent.ppc",
"4WS:httpd-manual-0:2.0.52-48.ent.s390",
"4WS:httpd-manual-0:2.0.52-48.ent.s390x",
"4WS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4WS:httpd-suexec-0:2.0.52-48.ent.i386",
"4WS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4WS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4WS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4WS:mod_ssl-1:2.0.52-48.ent.i386",
"4WS:mod_ssl-1:2.0.52-48.ent.ia64",
"4WS:mod_ssl-1:2.0.52-48.ent.ppc",
"4WS:mod_ssl-1:2.0.52-48.ent.s390",
"4WS:mod_ssl-1:2.0.52-48.ent.s390x",
"4WS:mod_ssl-1:2.0.52-48.ent.x86_64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.src",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1245"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:httpd-0:2.0.52-48.ent.i386",
"4AS:httpd-0:2.0.52-48.ent.ia64",
"4AS:httpd-0:2.0.52-48.ent.ppc",
"4AS:httpd-0:2.0.52-48.ent.s390",
"4AS:httpd-0:2.0.52-48.ent.s390x",
"4AS:httpd-0:2.0.52-48.ent.src",
"4AS:httpd-0:2.0.52-48.ent.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4AS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4AS:httpd-devel-0:2.0.52-48.ent.i386",
"4AS:httpd-devel-0:2.0.52-48.ent.ia64",
"4AS:httpd-devel-0:2.0.52-48.ent.ppc",
"4AS:httpd-devel-0:2.0.52-48.ent.s390",
"4AS:httpd-devel-0:2.0.52-48.ent.s390x",
"4AS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4AS:httpd-manual-0:2.0.52-48.ent.i386",
"4AS:httpd-manual-0:2.0.52-48.ent.ia64",
"4AS:httpd-manual-0:2.0.52-48.ent.ppc",
"4AS:httpd-manual-0:2.0.52-48.ent.s390",
"4AS:httpd-manual-0:2.0.52-48.ent.s390x",
"4AS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4AS:httpd-suexec-0:2.0.52-48.ent.i386",
"4AS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4AS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390",
"4AS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4AS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4AS:mod_ssl-1:2.0.52-48.ent.i386",
"4AS:mod_ssl-1:2.0.52-48.ent.ia64",
"4AS:mod_ssl-1:2.0.52-48.ent.ppc",
"4AS:mod_ssl-1:2.0.52-48.ent.s390",
"4AS:mod_ssl-1:2.0.52-48.ent.s390x",
"4AS:mod_ssl-1:2.0.52-48.ent.x86_64",
"4Desktop:httpd-0:2.0.52-48.ent.i386",
"4Desktop:httpd-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-0:2.0.52-48.ent.s390",
"4Desktop:httpd-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-0:2.0.52-48.ent.src",
"4Desktop:httpd-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.i386",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-devel-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390",
"4Desktop:httpd-devel-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-devel-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.i386",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-manual-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390",
"4Desktop:httpd-manual-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-manual-0:2.0.52-48.ent.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.i386",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ia64",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.ppc",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.s390x",
"4Desktop:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.i386",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ia64",
"4Desktop:mod_ssl-1:2.0.52-48.ent.ppc",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390",
"4Desktop:mod_ssl-1:2.0.52-48.ent.s390x",
"4Desktop:mod_ssl-1:2.0.52-48.ent.x86_64",
"4ES:httpd-0:2.0.52-48.ent.i386",
"4ES:httpd-0:2.0.52-48.ent.ia64",
"4ES:httpd-0:2.0.52-48.ent.ppc",
"4ES:httpd-0:2.0.52-48.ent.s390",
"4ES:httpd-0:2.0.52-48.ent.s390x",
"4ES:httpd-0:2.0.52-48.ent.src",
"4ES:httpd-0:2.0.52-48.ent.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4ES:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4ES:httpd-devel-0:2.0.52-48.ent.i386",
"4ES:httpd-devel-0:2.0.52-48.ent.ia64",
"4ES:httpd-devel-0:2.0.52-48.ent.ppc",
"4ES:httpd-devel-0:2.0.52-48.ent.s390",
"4ES:httpd-devel-0:2.0.52-48.ent.s390x",
"4ES:httpd-devel-0:2.0.52-48.ent.x86_64",
"4ES:httpd-manual-0:2.0.52-48.ent.i386",
"4ES:httpd-manual-0:2.0.52-48.ent.ia64",
"4ES:httpd-manual-0:2.0.52-48.ent.ppc",
"4ES:httpd-manual-0:2.0.52-48.ent.s390",
"4ES:httpd-manual-0:2.0.52-48.ent.s390x",
"4ES:httpd-manual-0:2.0.52-48.ent.x86_64",
"4ES:httpd-suexec-0:2.0.52-48.ent.i386",
"4ES:httpd-suexec-0:2.0.52-48.ent.ia64",
"4ES:httpd-suexec-0:2.0.52-48.ent.ppc",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390",
"4ES:httpd-suexec-0:2.0.52-48.ent.s390x",
"4ES:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4ES:mod_ssl-1:2.0.52-48.ent.i386",
"4ES:mod_ssl-1:2.0.52-48.ent.ia64",
"4ES:mod_ssl-1:2.0.52-48.ent.ppc",
"4ES:mod_ssl-1:2.0.52-48.ent.s390",
"4ES:mod_ssl-1:2.0.52-48.ent.s390x",
"4ES:mod_ssl-1:2.0.52-48.ent.x86_64",
"4WS:httpd-0:2.0.52-48.ent.i386",
"4WS:httpd-0:2.0.52-48.ent.ia64",
"4WS:httpd-0:2.0.52-48.ent.ppc",
"4WS:httpd-0:2.0.52-48.ent.s390",
"4WS:httpd-0:2.0.52-48.ent.s390x",
"4WS:httpd-0:2.0.52-48.ent.src",
"4WS:httpd-0:2.0.52-48.ent.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.i386",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ia64",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.ppc",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.s390x",
"4WS:httpd-debuginfo-0:2.0.52-48.ent.x86_64",
"4WS:httpd-devel-0:2.0.52-48.ent.i386",
"4WS:httpd-devel-0:2.0.52-48.ent.ia64",
"4WS:httpd-devel-0:2.0.52-48.ent.ppc",
"4WS:httpd-devel-0:2.0.52-48.ent.s390",
"4WS:httpd-devel-0:2.0.52-48.ent.s390x",
"4WS:httpd-devel-0:2.0.52-48.ent.x86_64",
"4WS:httpd-manual-0:2.0.52-48.ent.i386",
"4WS:httpd-manual-0:2.0.52-48.ent.ia64",
"4WS:httpd-manual-0:2.0.52-48.ent.ppc",
"4WS:httpd-manual-0:2.0.52-48.ent.s390",
"4WS:httpd-manual-0:2.0.52-48.ent.s390x",
"4WS:httpd-manual-0:2.0.52-48.ent.x86_64",
"4WS:httpd-suexec-0:2.0.52-48.ent.i386",
"4WS:httpd-suexec-0:2.0.52-48.ent.ia64",
"4WS:httpd-suexec-0:2.0.52-48.ent.ppc",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390",
"4WS:httpd-suexec-0:2.0.52-48.ent.s390x",
"4WS:httpd-suexec-0:2.0.52-48.ent.x86_64",
"4WS:mod_ssl-1:2.0.52-48.ent.i386",
"4WS:mod_ssl-1:2.0.52-48.ent.ia64",
"4WS:mod_ssl-1:2.0.52-48.ent.ppc",
"4WS:mod_ssl-1:2.0.52-48.ent.s390",
"4WS:mod_ssl-1:2.0.52-48.ent.s390x",
"4WS:mod_ssl-1:2.0.52-48.ent.x86_64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Client-Workstation-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Client-Workstation-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.src",
"5Server-5.7.Z:httpd-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-debuginfo-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.ppc64",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-devel-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:httpd-manual-0:2.2.3-53.el5_7.1.x86_64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.i386",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ia64",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.ppc",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.s390x",
"5Server-5.7.Z:mod_ssl-1:2.2.3-53.el5_7.1.x86_64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.src",
"6Server-6.1.z:httpd-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-debuginfo-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-devel-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:httpd-manual-0:2.2.15-9.el6_1.2.noarch",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:httpd-tools-0:2.2.15-9.el6_1.2.x86_64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.i686",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.ppc64",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.s390x",
"6Server-6.1.z:mod_ssl-1:2.2.15-9.el6_1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011_1294
Vulnerability from csaf_redhat - Published: 2011-09-14 18:59 - Updated: 2024-11-22 04:38The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.3 Long Life, 5.6 Extended Update Support, and\n6.0 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1294",
"url": "https://access.redhat.com/errata/RHSA-2011:1294"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1294.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2024-11-22T04:38:13+00:00",
"generator": {
"date": "2024-11-22T04:38:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1294",
"initial_release_date": "2011-09-14T18:59:00+00:00",
"revision_history": [
{
"date": "2011-09-14T18:59:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-14T15:01:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:38:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:5.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product_id": "httpd-0:2.2.3-22.el5_3.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product_id": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product_id": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-45.el5_6.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.i386",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.i386",
"product_id": "httpd-0:2.2.3-45.el5_6.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.3?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.i386",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.i386",
"product_id": "httpd-0:2.2.3-22.el5_3.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.3-45.el5_6.2.src",
"product": {
"name": "httpd-0:2.2.3-45.el5_6.2.src",
"product_id": "httpd-0:2.2.3-45.el5_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-45.el5_6.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.3.src",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.3.src",
"product_id": "httpd-0:2.2.3-22.el5_3.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.3?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.src",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.src",
"product_id": "httpd-0:2.2.15-5.el6_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product_id": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.15-5.el6_0.1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.15-5.el6_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product_id": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.15-5.el6_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product": {
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product_id": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.15-5.el6_0.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.src as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.src",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.i386",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.3 server)",
"product_id": "5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"relates_to_product_reference": "5Server-5.3.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.src",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.s390",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.15-5.el6_0.1.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch"
},
"product_reference": "httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.i686",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"relates_to_product_reference": "6Server-6.0.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
"product_id": "6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
},
"product_reference": "mod_ssl-1:2.2.15-5.el6_0.1.x86_64",
"relates_to_product_reference": "6Server-6.0.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-14T18:59:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1294"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.src",
"5Server-5.3.LL:httpd-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-debuginfo-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-devel-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:httpd-manual-0:2.2.3-22.el5_3.3.x86_64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.i386",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.ia64",
"5Server-5.3.LL:mod_ssl-1:2.2.3-22.el5_3.3.x86_64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.src",
"5Server-5.6.Z:httpd-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-debuginfo-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.ppc64",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-devel-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:httpd-manual-0:2.2.3-45.el5_6.2.x86_64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.i386",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ia64",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.ppc",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.s390x",
"5Server-5.6.Z:mod_ssl-1:2.2.3-45.el5_6.2.x86_64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.src",
"6Server-6.0.z:httpd-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-debuginfo-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-devel-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:httpd-manual-0:2.2.15-5.el6_0.1.noarch",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:httpd-tools-0:2.2.15-5.el6_0.1.x86_64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.i686",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.ppc64",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.s390x",
"6Server-6.0.z:mod_ssl-1:2.2.15-5.el6_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011_1300
Vulnerability from csaf_redhat - Published: 2011-09-15 17:42 - Updated: 2024-11-22 04:38The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-ELS:httpd-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-0:2.0.46-78.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-0:2.0.46-78.ent.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix one security issue are now available for\nRed Hat Enterprise Linux 3 Extended Life Cycle Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause httpd to use an\nexcessive amount of memory and CPU time via HTTP requests with a\nspecially-crafted Range header. (CVE-2011-3192)\n\nAll httpd users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1300",
"url": "https://access.redhat.com/errata/RHSA-2011:1300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1300.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2024-11-22T04:38:18+00:00",
"generator": {
"date": "2024-11-22T04:38:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1300",
"initial_release_date": "2011-09-15T17:42:00+00:00",
"revision_history": [
{
"date": "2011-09-15T17:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-15T13:52:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:38:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.46-78.ent.src",
"product": {
"name": "httpd-0:2.0.46-78.ent.src",
"product_id": "httpd-0:2.0.46-78.ent.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-78.ent?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-0:2.0.46-78.ent.i386",
"product_id": "httpd-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-78.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-devel-0:2.0.46-78.ent.i386",
"product_id": "httpd-devel-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-78.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-78.ent.i386",
"product": {
"name": "mod_ssl-1:2.0.46-78.ent.i386",
"product_id": "mod_ssl-1:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-78.ent?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product_id": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-78.ent?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-0:2.0.46-78.ent.src"
},
"product_reference": "httpd-0:2.0.46-78.ent.src",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-78.ent.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-78.ent.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-0:2.0.46-78.ent.src"
},
"product_reference": "httpd-0:2.0.46-78.ent.src",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-78.ent.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-78.ent.i386",
"relates_to_product_reference": "3ES-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-15T17:42:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1300"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS-ELS:httpd-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-0:2.0.46-78.ent.src",
"3AS-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3AS-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3AS-ELS:mod_ssl-1:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-0:2.0.46-78.ent.src",
"3ES-ELS:httpd-debuginfo-0:2.0.46-78.ent.i386",
"3ES-ELS:httpd-devel-0:2.0.46-78.ent.i386",
"3ES-ELS:mod_ssl-1:2.0.46-78.ent.i386"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011_1329
Vulnerability from csaf_redhat - Published: 2011-09-21 19:50 - Updated: 2024-11-22 04:38The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd and httpd22 packages that fix one security issue are now\navailable for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise\nLinux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause the Apache HTTP\nServer to use an excessive amount of memory and CPU time via HTTP requests\nwith a specially-crafted Range header. (CVE-2011-3192)\n\nAll users of JBoss Enterprise Web Server 1.0.2 should upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAfter installing the updated packages, Red Hat Enterprise Linux 4 users\nmust restart the httpd22 service, and Red Hat Enterprise Linux 5 and 6\nusers must restart the httpd service, for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1329",
"url": "https://access.redhat.com/errata/RHSA-2011:1329"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1329.json"
}
],
"title": "Red Hat Security Advisory: httpd and httpd22 security update",
"tracking": {
"current_release_date": "2024-11-22T04:38:22+00:00",
"generator": {
"date": "2024-11-22T04:38:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1329",
"initial_release_date": "2011-09-21T19:50:00+00:00",
"revision_history": [
{
"date": "2011-09-21T19:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-21T15:58:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:38:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-16.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product_id": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-16.ep5.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-14.1.ep5.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product_id": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-14.1.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-13.2.ep5.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product_id": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-13.2.ep5.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-manual@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product_id": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.17-16.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product_id": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.17-16.ep5.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product_id": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-14.1.ep5.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product_id": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-14.1.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product_id": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.17-13.2.ep5.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.17-13.2.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product_id": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.17-13.2.ep5.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-0:2.2.17-16.ep5.el4.src",
"product": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src",
"product_id": "httpd22-0:2.2.17-16.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.17-16.ep5.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product_id": "httpd-0:2.2.17-14.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-14.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product_id": "httpd-0:2.2.17-13.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.17-13.2.ep5.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-21T19:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1329"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.17-16.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.17-16.ep5.el4.x86_64",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-14.1.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-14.1.ep5.el5.x86_64",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.src",
"6Server-JBEWS-1:httpd-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-devel-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-manual-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:httpd-tools-0:2.2.17-13.2.ep5.el6.x86_64",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.i386",
"6Server-JBEWS-1:mod_ssl-1:2.2.17-13.2.ep5.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
RHSA-2011_1330
Vulnerability from csaf_redhat - Published: 2011-09-21 20:00 - Updated: 2024-11-22 04:38The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Web Server 1.0
Red Hat / Red Hat JBoss Web Server
|
cpe:/a:redhat:jboss_enterprise_web_server:1.0
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the Apache HTTP Server component for JBoss Enterprise Web\nServer 1.0.2 that fixes one security issue is now available from the Red\nHat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular web server.\n\nA flaw was found in the way the Apache HTTP Server handled Range HTTP\nheaders. A remote attacker could use this flaw to cause the Apache HTTP\nServer to use an excessive amount of memory and CPU time via HTTP requests\nwith a specially-crafted Range header. (CVE-2011-3192)\n\nAll users of JBoss Enterprise Web Server 1.0.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1330",
"url": "https://access.redhat.com/errata/RHSA-2011:1330"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2"
},
{
"category": "external",
"summary": "732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1330.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 security update",
"tracking": {
"current_release_date": "2024-11-22T04:38:26+00:00",
"generator": {
"date": "2024-11-22T04:38:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1330",
"initial_release_date": "2011-09-21T20:00:00+00:00",
"revision_history": [
{
"date": "2011-09-21T20:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:43:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:38:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0",
"product": {
"name": "Red Hat JBoss Web Server 1.0",
"product_id": "Red Hat JBoss Web Server 1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3192",
"discovery_date": "2011-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732928"
}
],
"notes": [
{
"category": "description",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple ranges DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Before updated packages are deployed, users can deploy configuration changes to mitigate this flaw:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3192#c18",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "RHBZ#732928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3192"
}
],
"release_date": "2011-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-21T20:00:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe JBoss server process must be restarted for this update to take effect.",
"product_ids": [
"Red Hat JBoss Web Server 1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1330"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: multiple ranges DoS"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.