Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2002-0012
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:16.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2001:163", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "name": "oval:org.mitre.oval:def:161", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "name": "oval:org.mitre.oval:def:144", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "name": "MS02-006", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "name": "5043", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5043" }, { "name": "HPSBMP0206-015", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/4211" }, { "name": "20020201-01-A", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A" }, { "name": "CA-2002-03", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "name": "VU#107186", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/107186" }, { "name": "oval:org.mitre.oval:def:1048", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "name": "oval:org.mitre.oval:def:298", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "name": "20020212 PROTOS Remote SNMP Attack Tool", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://www.iss.net/security_center/alerts/advise110.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2001:163", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "name": "oval:org.mitre.oval:def:161", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "name": "oval:org.mitre.oval:def:144", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "name": "MS02-006", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "name": "5043", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5043" }, { "name": "HPSBMP0206-015", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/advisories/4211" }, { "name": "20020201-01-A", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A" }, { "name": "CA-2002-03", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "name": "VU#107186", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/107186" }, { "name": "oval:org.mitre.oval:def:1048", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "name": "oval:org.mitre.oval:def:298", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "name": "20020212 PROTOS Remote SNMP Attack Tool", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://www.iss.net/security_center/alerts/advise110.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2001:163", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "name": "oval:org.mitre.oval:def:161", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "name": "oval:org.mitre.oval:def:144", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "name": "MS02-006", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "name": "5043", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5043" }, { "name": "HPSBMP0206-015", "refsource": "HP", "url": "http://www.securityfocus.com/advisories/4211" }, { "name": "20020201-01-A", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A" }, { "name": "CA-2002-03", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "name": "VU#107186", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/107186" }, { "name": "oval:org.mitre.oval:def:1048", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "name": "oval:org.mitre.oval:def:298", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "name": "20020212 PROTOS Remote SNMP Attack Tool", "refsource": "ISS", "url": "http://www.iss.net/security_center/alerts/advise110.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0012", "datePublished": "2002-02-18T05:00:00", "dateReserved": "2002-01-10T00:00:00", "dateUpdated": "2024-08-08T02:35:16.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2002-0012\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-02-13T05:00:00.000\",\"lastModified\":\"2024-11-20T23:38:05.600\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidades en un elevado n\u00famero de implementaciones SNMP permite que atacantes remotos provoquen una denegaci\u00f3n del servicio u obtengan privilegios debido al manejo del mensaje trap de SNMPv1 (como se ha demostrado por medio del suite PROTOS c06-SNMv1).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9249561D-5224-41C5-A5B4-29F2F63ED163\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cert.org/advisories/CA-2002-03.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/alerts/advise110.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/107186\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2001-163.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/advisories/4211\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5043\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cert.org/advisories/CA-2002-03.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/alerts/advise110.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/107186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2001-163.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/advisories/4211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
var-200202-0006
Vulnerability from variot
Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code ・ If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the “Overview” for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. MPE/iX is an Internet-ready operating system for the HP e3000 class servers. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. It was previously known as UCD-SNMP. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent. Multiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP trap messages. Among the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. HP has confirmed that large traps will cause OpenView Network Node Manager to crash. This may be due to an exploitable buffer overflow condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200202-0006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "3com", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "adtran", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "adventnet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "american power conversion", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "aprisma", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "bea", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "bmc", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cnt", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "comtek services", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cscare", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cacheflow", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "carrier access", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "compaq computer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "computer associates", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "concord", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "dart", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "digital", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "entrada", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "equinox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "fluke", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "general datacomm", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hirschmann", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "iplanet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "itouch", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "infovista", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "inktomi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "innerdive", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ipswitch", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "karlnet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lantronix", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "larscom incorporated", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lotus", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lucent", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mg soft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "marconi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mercury interactive", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "metrobility optical", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "micromuse", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "monfox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "multinet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "net snmp", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "network harmoni", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nbase xyplex", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netscout", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netsilicon", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netscape", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "network appliance", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openwave", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "optical access", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "perle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "powerware", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "radware", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "redback", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "riverstone", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "snmp research", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sniffer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sonicwall", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sonus", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "symantec", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "the sco group sco unix", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "tivoli", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "toshiba", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "unisphere", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "vertical", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "vina", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "wind river", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "world wide packets", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "xerox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "e security", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "net com", "version": null }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "4.3" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.1" }, { "model": "snmp", "scope": "eq", "trust": 1.0, "vendor": "snmp", "version": "*" }, { "model": "windows 98se", "scope": null, "trust": 0.9, "vendor": "microsoft", "version": null }, { "model": "windows", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "95" }, { "model": "windows server", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "2000" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nudesign team", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "outback resource group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "veritas", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "bintec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "interniche", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ncipher corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netscreen", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nokia", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "2.6 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "2.6 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.10" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.04" }, { "model": "windows 2000", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "95" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98 scd" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "me" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (server)" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (terminal_srv)" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (workstation)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "windows xp gold", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "windows nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "4.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "6.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "6.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4.0" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.6, "vendor": "net snmp", "version": "4.2.1" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.6, "vendor": "net snmp", "version": "4.1.1" }, { "model": "ucd-snmp", "scope": "ne", "trust": 0.6, "vendor": "net snmp", "version": "4.2.2" }, { "model": "snmp", "scope": null, "trust": 0.6, "vendor": "snmp", "version": null }, { "model": "mpe/ix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.0" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0.1" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0.1" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "4.1.2" }, { "model": "ucd-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "4.2.3" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "solaris 2.6 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.6" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.5" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.4" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.3" }, { "model": "research mid-level manager", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "research enterpol", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "research dr-web manager", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "brocade", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.6.0" }, { "model": "networks aos", "scope": null, "trust": 0.3, "vendor": "redback", "version": null }, { "model": "realplayer intranet", "scope": "eq", "trust": 0.3, "vendor": "realnetworks", "version": "5.0" }, { "model": "software tcpware", "scope": "eq", "trust": 0.3, "vendor": "process", "version": "5.5" }, { "model": "software multinet", "scope": "eq", "trust": 0.3, "vendor": "process", "version": "4.4" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.1" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.11" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.2" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.0" }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows nt workstation sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "98" }, { "model": "windows terminal services sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows terminal services sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows terminal services", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "domino snmp agents solaris", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1x86" }, { "model": "domino snmp agents solaris sparc", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1" }, { "model": "domino snmp agents hp-ux", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1" }, { "model": "lrs", "scope": null, "trust": 0.3, "vendor": "lantronix", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.0" }, { "model": "solutions router ip console", "scope": "eq", "trust": 0.3, "vendor": "innerdive", "version": "3.3.0.406" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.3" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1" }, { "model": "secure os software for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "procurve switch 8000m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4108gl-bundle", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4108gl", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4000m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2525" }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2524" }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2512" }, { "model": "procurve switch 2424m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 2400m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 1600m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ov/sam", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.10" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "openview network node manager nt 4.x/windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.22000" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.211.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.210.x" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.111.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.110.x" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "openview network node manager nt 4.x/windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.02000" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.011.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.010.20" }, { "model": "openview network node manager windows nt", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0.23.51/4.0" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "openview extensible snmp agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "openview emanate snmp agent solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.22.x" }, { "model": "openview emanate snmp agent hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.211.x" }, { "model": "openview emanate snmp agent hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.210.20" }, { "model": "openview distributed management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "openview distributed management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.03" }, { "model": "mc/serviceguard", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.20.00" }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.08.32" }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.08.00" }, { "model": "ito/vpo/ovo unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.04" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "ems a.03.20", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ems a.03.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ems a.03.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "services nmserver", "scope": "eq", "trust": 0.3, "vendor": "comtek", "version": "3.4" }, { "model": "associates unicenter", "scope": null, "trust": 0.3, "vendor": "computer", "version": null }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7.1.1" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7.1.0" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7" }, { "model": "openunix", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "8.0" }, { "model": "openserver", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "5.0.6" }, { "model": "openserver", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "5.0.5" }, { "model": "cacheos", "scope": "eq", "trust": 0.3, "vendor": "cacheflow", "version": "4.0" }, { "model": "cacheos", "scope": "eq", "trust": 0.3, "vendor": "cacheflow", "version": "3.1" }, { "model": "web nms msp edition", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "web nms", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "snmp utilities", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "snmp api", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "mediation server", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "management builder", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "fault management toolkit", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "configuration management toolkit", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "cli api", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "agent toolkit java/jmx edition", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "agent toolkit c edition", "scope": "eq", "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "webcache", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "3000" }, { "model": "webcache", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "1000" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "4900" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "4400" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "3300" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "1100" }, { "model": "ps hub", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "50" }, { "model": "ps hub", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "40" }, { "model": "dual speed hub", "scope": null, "trust": 0.3, "vendor": "3com", "version": null }, { "model": "brocade .0d", "scope": "ne", "trust": 0.3, "vendor": "sgi", "version": "2.6" }, { "model": "solutions router ip console", "scope": "ne", "trust": 0.3, "vendor": "innerdive", "version": "3.3.0.407" }, { "model": "jetdirect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x.21.00" }, { "model": "jetdirect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x.08.32" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0012" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by the Oulu University Secure Programming Group.", "sources": [ { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 0.9 }, "cve": "CVE-2002-0012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2002-0012", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2002-0012", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#107186", "trust": 0.8, "value": "69.26" }, { "author": "CARNEGIE MELLON", "id": "VU#854306", "trust": 0.8, "value": "42.64" }, { "author": "CNNVD", "id": "CNNVD-200202-007", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code \u30fb If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. MPE/iX is an Internet-ready operating system for the HP e3000 class servers. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. It was previously known as UCD-SNMP. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent. \nMultiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP trap messages. \nAmong the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. \nHP has confirmed that large traps will cause OpenView Network Node Manager to crash. This may be due to an exploitable buffer overflow condition", "sources": [ { "db": "NVD", "id": "CVE-2002-0012" }, { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 4.68 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2002-0012", "trust": 3.9 }, { "db": "CERT/CC", "id": "VU#107186", "trust": 3.2 }, { "db": "BID", "id": "4088", "trust": 2.2 }, { "db": "BID", "id": "4732", "trust": 1.9 }, { "db": "BID", "id": "4089", "trust": 1.9 }, { "db": "BID", "id": "4132", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#854306", "trust": 1.4 }, { "db": "BID", "id": "5043", "trust": 1.3 }, { "db": "XF", "id": "8177", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2002-000033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200202-007", "trust": 0.6 }, { "db": "BID", "id": "89608", "trust": 0.3 }, { "db": "BID", "id": "89661", "trust": 0.3 }, { "db": "BID", "id": "4203", "trust": 0.3 } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "id": "VAR-200202-0006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.489583335 }, "last_update_date": "2024-07-23T22:34:48.127000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBUX00184", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00964944" }, { "title": "MS02-006", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.mspx" }, { "title": "RHSA-2001:163", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2001-163.html" }, { "title": "#00215", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-1" }, { "title": "#00215", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-3" }, { "title": "IBM Information for VU#107186", "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/iafy-55krcv" }, { "title": "MS02-006", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms02-006.mspx" }, { "title": "RHSA-2001:163", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2001-163j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.cert.org/advisories/ca-2002-03.html" }, { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/107186" }, { "trust": 1.6, "url": "http://www.ee.oulu.fi/research/ouspg/protos/" }, { "trust": 1.6, "url": "http://www.cert.org/tech_tips/denial_of_service.html" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc3000.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1212.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1213.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1215.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1270.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2570.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2571.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2572.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2573.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2574.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2575.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2576.txt" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/4088" }, { "trust": 1.6, "url": "http://online.securityfocus.com/bid/4132" }, { "trust": 1.6, "url": "http://online.securityfocus.com/bid/4732" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/4089" }, { "trust": 1.6, "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "trust": 1.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0012" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-a" }, { "trust": 1.0, "url": "http://www.iss.net/security_center/alerts/advise110.php" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2001-163.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/advisories/4211" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/5043" }, { "trust": 1.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1048" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a144" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a161" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a298" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/m-042.shtml" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/20020213snmp.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2002/wr020701.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2002/wr020901.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2002/at020001.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2002-03" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0012" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/8177" }, { "trust": 0.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0013" }, { "trust": 0.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.asp" }, { "trust": 0.6, "url": "http://www.kb.cert.org/vuls/id/854306" }, { "trust": 0.3, "url": "http://online.securityfocus.com/bid/4088" }, { "trust": 0.3, "url": "http://online.securityfocus.com/bid/4089" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f44605" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f42769" }, { "trust": 0.3, "url": "http://online.securityfocus.com/news/474" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-006.asp" }, { "trust": 0.3, "url": "http://otn.oracle.com/deploy/security/pdf/snmp_2002_alert.pdf" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-01-16T00:00:00", "db": "CERT/CC", "id": "VU#107186" }, { "date": "2002-02-12T00:00:00", "db": "CERT/CC", "id": "VU#854306" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89608" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89661" }, { "date": "2002-06-18T00:00:00", "db": "BID", "id": "5043" }, { "date": "2002-05-13T00:00:00", "db": "BID", "id": "4732" }, { "date": "2002-02-27T00:00:00", "db": "BID", "id": "4203" }, { "date": "2002-02-12T00:00:00", "db": "BID", "id": "4088" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "date": "2002-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200202-007" }, { "date": "2002-02-13T05:00:00", "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-11-07T00:00:00", "db": "CERT/CC", "id": "VU#107186" }, { "date": "2007-11-07T00:00:00", "db": "CERT/CC", "id": "VU#854306" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89608" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89661" }, { "date": "2009-07-11T13:56:00", "db": "BID", "id": "5043" }, { "date": "2002-05-13T00:00:00", "db": "BID", "id": "4732" }, { "date": "2009-07-11T10:56:00", "db": "BID", "id": "4203" }, { "date": "2009-07-11T10:56:00", "db": "BID", "id": "4088" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200202-007" }, { "date": "2018-10-12T21:30:46.750000", "db": "NVD", "id": "CVE-2002-0012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 1.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in SNMPv1 trap handling", "sources": [ { "db": "CERT/CC", "id": "VU#107186" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" } ], "trust": 0.6 } }
gsd-2002-0012
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2002-0012", "description": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "id": "GSD-2002-0012", "references": [ "https://access.redhat.com/errata/RHSA-2002:088", "https://access.redhat.com/errata/RHSA-2002:036", "https://access.redhat.com/errata/RHSA-2001:163", "https://www.debian.org/security/2002/dsa-111" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2002-0012" ], "details": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "id": "GSD-2002-0012", "modified": "2023-12-13T01:24:07.390879Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2001:163", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "name": "oval:org.mitre.oval:def:161", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "name": "oval:org.mitre.oval:def:144", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "name": "MS02-006", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "name": "5043", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5043" }, { "name": "HPSBMP0206-015", "refsource": "HP", "url": "http://www.securityfocus.com/advisories/4211" }, { "name": "20020201-01-A", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A" }, { "name": "CA-2002-03", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "name": "VU#107186", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/107186" }, { "name": "oval:org.mitre.oval:def:1048", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "name": "oval:org.mitre.oval:def:298", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "name": "20020212 PROTOS Remote SNMP Attack Tool", "refsource": "ISS", "url": "http://www.iss.net/security_center/alerts/advise110.php" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0012" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20020212 PROTOS Remote SNMP Attack Tool", "refsource": "ISS", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/alerts/advise110.php" }, { "name": "CA-2002-03", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "name": "VU#107186", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/107186" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html", "refsource": "MISC", "tags": [], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "name": "RHSA-2001:163", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "name": "20020201-01-A", "refsource": "SGI", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-A" }, { "name": "HPSBMP0206-015", "refsource": "HP", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/advisories/4211" }, { "name": "5043", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5043" }, { "name": "oval:org.mitre.oval:def:298", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "name": "oval:org.mitre.oval:def:161", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "name": "oval:org.mitre.oval:def:144", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "name": "oval:org.mitre.oval:def:1048", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "name": "MS02-006", "refsource": "MS", "tags": [], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-12T21:30Z", "publishedDate": "2002-02-13T05:00Z" } } }
rhsa-2002_036
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ethereal packages are available for Red Hat Powertools 6.2, 7, and\n7.1. These packages are required for the Red Hat Security Advisory\nregarding applications linked against the old ucd-snmp libraries and also\nfix other security issues in ethereal.", "title": "Topic" }, { "category": "general", "text": "Ethereal is a network traffic analyzer and monitor.\n\nThe Red Hat Security Advisory for ucd-snmp included updated libraries. All\napplications linked against the old ucd-snmp libraries need to be\nupdated.\n\nIf you have updated your ucd-snmp package you must update the ethereal\npackage as well.\n\nFor all other third party applications possibly affected by the Red Hat\nSecurity Advisory for ucd-snmp, please contact the software vendor.\n\nThis errata provides Ethereal version 0.9.6. Previous versions of Ethereal\nwere found to contain a number of security issues:\n\nBuffer overflow in Ethereal 0.9.5 and earlier allows remote attackers\nto cause a denial of service or execute arbitrary code via the ISIS\ndissector. (CAN-2002-0834)\n\nBuffer overflows in Ethereal 0.9.4 and earlier allow remote attackers\nto cause a denial of service or execute arbitrary code via the BGP\ndissector or the WCP dissector. (CAN-2002-0821)\n\nEthereal 0.9.4 and earlier allows remote attackers to cause a denial\nof service and possibly excecute arbitrary code via the SOCKS, \nRSVP, AFS, or LMP dissectors, which can be caused to core\ndump. (CAN-2002-0822)\n\nDue to improper string and error handling in Ethereal\u0027s ASN.1 parser, it\nis possible for a malformed SNMP or LDAP packet to cause a memory\nallocation or buffer overrun error in Ethereal versions before 0.9.2.\n(CAN-2002-0013 CAN-2002-0012)\n\nThe ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to\ncause a denial of service (crash) via a certain malformed packet, which\ncauses Ethereal to allocate memory incorrectly, possibly due to zero-length\nfields. (CAN-2002-0353)\n\nThe SMB dissector in Ethereal prior to version 0.9.2 allows remote\nattackers to cause a denial of service (crash) or execute arbitrary code\nvia malformed packets that cause Ethereal to dereference a NULL pointer.\n(CAN-2002-0401)\n\nA buffer overflow in X11 dissector in Ethereal before 0.9.4 allows\nremote attackers to cause a denial of service (crash) and possibly\nexecute arbitrary code while Ethereal is parsing keysyms. (CAN-2002-0402)\n\nThe DNS dissector in Ethereal before 0.9.4 allows remote attackers to\ncause a denial of service (CPU consumption) via a malformed packet\nthat causes Ethereal to enter an infinite loop. (CAN-2002-0403)\n\nA vulnerability in the GIOP dissector in Ethereal before 0.9.4 allows\nremote attackers to cause a denial of service (memory consumption).\n(CAN-2002-0404)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:036", "url": "https://access.redhat.com/errata/RHSA-2002:036" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00001.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00001.html" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00003.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00003.html" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00005.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00005.html" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00006.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00006.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2002/rhsa-2002_036.json" } ], "title": "Red Hat Security Advisory: : Updated ethereal packages available", "tracking": { "current_release_date": "2024-11-21T22:21:58+00:00", "generator": { "date": "2024-11-21T22:21:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:036", "initial_release_date": "2002-09-13T19:09:00+00:00", "revision_history": [ { "date": "2002-09-13T19:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2002-02-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:21:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Powertools 6.2", "product": { "name": "Red Hat Powertools 6.2", "product_id": "Red Hat Powertools 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:powertools:6.2" } } }, { "category": "product_name", "name": "Red Hat Powertools 7.0", "product": { "name": "Red Hat Powertools 7.0", "product_id": "Red Hat Powertools 7.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:powertools:7.0" } } }, { "category": "product_name", "name": "Red Hat Powertools 7.1", "product": { "name": "Red Hat Powertools 7.1", "product_id": "Red Hat Powertools 7.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:powertools:7.1" } } } ], "category": "product_family", "name": "Red Hat Powertools" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-0012", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616720" } ], "notes": [ { "category": "description", "text": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0012" }, { "category": "external", "summary": "RHBZ#1616720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0012", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0012" } ], "release_date": "2002-02-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "title": "security flaw" }, { "cve": "CVE-2002-0013", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616721" } ], "notes": [ { "category": "description", "text": "Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0013" }, { "category": "external", "summary": "RHBZ#1616721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0013", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0013" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0013", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0013" } ], "release_date": "2002-02-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "title": "security flaw" }, { "cve": "CVE-2002-0353", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616761" } ], "notes": [ { "category": "description", "text": "The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0353" }, { "category": "external", "summary": "RHBZ#1616761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0353", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0353" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0353", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0353" } ], "release_date": "2002-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "title": "security flaw" }, { "cve": "CVE-2002-0401", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616775" } ], "notes": [ { "category": "description", "text": "SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0401" }, { "category": "external", "summary": "RHBZ#1616775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0401" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "title": "security flaw" }, { "cve": "CVE-2002-0402", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616776" } ], "notes": [ { "category": "description", "text": "Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0402" }, { "category": "external", "summary": "RHBZ#1616776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616776" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0402", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0402" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0403", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616777" } ], "notes": [ { "category": "description", "text": "DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0403" }, { "category": "external", "summary": "RHBZ#1616777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0403", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0403" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0404", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616778" } ], "notes": [ { "category": "description", "text": "Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0404" }, { "category": "external", "summary": "RHBZ#1616778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0404", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0404" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0821", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616814" } ], "notes": [ { "category": "description", "text": "Buffer overflows in Ethereal 0.9.4 and earlier allow remote attackers to cause a denial of service or execute arbitrary code via (1) the BGP dissector, or (2) the WCP dissector.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0821" }, { "category": "external", "summary": "RHBZ#1616814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0821", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0821" } ], "release_date": "2002-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0822", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616815" } ], "notes": [ { "category": "description", "text": "Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0822" }, { "category": "external", "summary": "RHBZ#1616815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0822", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0822" } ], "release_date": "2002-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0834", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616817" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the ISIS dissector for Ethereal 0.9.5 and earlier allows remote attackers to cause a denial of service or execute arbitrary code via malformed packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0834" }, { "category": "external", "summary": "RHBZ#1616817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616817" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0834", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0834" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-09-13T19:09:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:036" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2002_088
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ethereal packages are available which fix several security problems.", "title": "Topic" }, { "category": "general", "text": "Ethereal is a package designed for monitoring network traffic on your\nsystem. Several security issues have been found in Ethereal:\n\nDue to improper string and error handling in Ethereal\u0027s ASN.1 parser, it is\npossible for a malformed SNMP or LDAP packet to cause a memory allocation\nor buffer overrun error in Ethereal versions before 0.9.2 (CAN-2002-0013\nCAN-2002-0012)\n\nThe ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to\ncause a denial of service (crash) via a certain malformed packet, which\ncauses Ethereal to allocate memory incorrectly, possibly due to zero-length\nfields. (CAN-2002-0353)\n\nThe SMB dissector in Ethereal prior to version 0.9.2 allows remote\nattackers to cause a denial of service (crash) or execute arbitrary code\nvia malformed packets that cause Ethereal to dereference a NULL pointer.\n(CAN-2002-0401)\n\nA buffer overflow in X11 dissector in Ethereal before 0.9.3 allows\nremote attackers to cause a denial of service (crash) and possibly\nexecute arbitrary code while Ethereal is parsing keysyms. (CAN-2002-0402)\n\nThe DNS dissector in Ethereal before 0.9.3 allows remote attackers to\ncause a denial of service (CPU consumption) via a malformed packet\nthat causes Ethereal to enter an infinite loop. (CAN-2002-0403)\n\nA vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote\nattackers to cause a denial of service (memory consumption). (CAN-2002-0404)\n\nUsers of Ethereal should update to the errata packages containing Ethereal\nversion 0.9.4 which is not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:088", "url": "https://access.redhat.com/errata/RHSA-2002:088" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00001.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00001.html" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00003.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00003.html" }, { "category": "external", "summary": "http://www.ethereal.com/appnotes/enpa-sa-00004.html", "url": "http://www.ethereal.com/appnotes/enpa-sa-00004.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2002/rhsa-2002_088.json" } ], "title": "Red Hat Security Advisory: : Updated ethereal packages are available", "tracking": { "current_release_date": "2024-11-21T22:22:02+00:00", "generator": { "date": "2024-11-21T22:22:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:088", "initial_release_date": "2002-06-06T06:53:00+00:00", "revision_history": [ { "date": "2002-06-06T06:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2002-05-16T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:22:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-0012", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616720" } ], "notes": [ { "category": "description", "text": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0012" }, { "category": "external", "summary": "RHBZ#1616720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0012", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0012" } ], "release_date": "2002-02-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "title": "security flaw" }, { "cve": "CVE-2002-0013", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616721" } ], "notes": [ { "category": "description", "text": "Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0013" }, { "category": "external", "summary": "RHBZ#1616721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0013", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0013" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0013", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0013" } ], "release_date": "2002-02-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "title": "security flaw" }, { "cve": "CVE-2002-0353", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616761" } ], "notes": [ { "category": "description", "text": "The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0353" }, { "category": "external", "summary": "RHBZ#1616761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0353", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0353" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0353", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0353" } ], "release_date": "2002-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "title": "security flaw" }, { "cve": "CVE-2002-0401", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616775" } ], "notes": [ { "category": "description", "text": "SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0401" }, { "category": "external", "summary": "RHBZ#1616775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0401" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "title": "security flaw" }, { "cve": "CVE-2002-0402", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616776" } ], "notes": [ { "category": "description", "text": "Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0402" }, { "category": "external", "summary": "RHBZ#1616776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616776" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0402", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0402" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0403", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616777" } ], "notes": [ { "category": "description", "text": "DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0403" }, { "category": "external", "summary": "RHBZ#1616777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0403", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0403" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-0404", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616778" } ], "notes": [ { "category": "description", "text": "Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0404" }, { "category": "external", "summary": "RHBZ#1616778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0404", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0404" } ], "release_date": "2002-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2002-06-06T06:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.2", "Red Hat Linux 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:088" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
ghsa-f36q-vfjv-585j
Vulnerability from github
Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.
{ "affected": [], "aliases": [ "CVE-2002-0012" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-02-13T05:00:00Z", "severity": "HIGH" }, "details": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.", "id": "GHSA-f36q-vfjv-585j", "modified": "2022-05-03T03:07:46Z", "published": "2022-05-03T03:07:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0012" }, { "type": "WEB", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298" }, { "type": "WEB", "url": "http://www.cert.org/advisories/CA-2002-03.html" }, { "type": "WEB", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "type": "WEB", "url": "http://www.iss.net/security_center/alerts/advise110.php" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/107186" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2001-163.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/advisories/4211" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/5043" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.