Action not permitted
Modal body text goes here.
cve-2004-0081
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9899", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9899" }, { "name": "ESA-20040317-003", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "name": "20040317 Re: New OpenSSL releases fix denial of service attacks [17 March 2004]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "name": "RHSA-2004:121", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "CLA-2004:834", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "20040304-01-U", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc" }, { "name": "openssl-tls-dos(15509)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "FEDORA-2004-095", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "name": "57524", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "oval:org.mitre.oval:def:871", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "name": "oval:org.mitre.oval:def:11755", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" }, { "name": "VU#465542", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/465542" }, { "name": "TA04-078A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "GLSA-200403-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "11139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "RHSA-2004:119", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "name": "oval:org.mitre.oval:def:902", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "name": "RHSA-2004:139", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "name": "2004-0012", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "DSA-465", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-465" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9899", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9899" }, { "name": "ESA-20040317-003", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "name": "20040317 Re: New OpenSSL releases fix denial of service attacks [17 March 2004]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "name": "RHSA-2004:121", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "CLA-2004:834", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "20040304-01-U", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc" }, { "name": "openssl-tls-dos(15509)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "FEDORA-2004-095", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "name": "57524", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "oval:org.mitre.oval:def:871", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "name": "oval:org.mitre.oval:def:11755", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" }, { "name": "VU#465542", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/465542" }, { "name": "TA04-078A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "GLSA-200403-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "11139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "RHSA-2004:119", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "name": "oval:org.mitre.oval:def:902", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "name": "RHSA-2004:139", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "name": "2004-0012", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "DSA-465", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-465" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9899", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9899" }, { "name": "ESA-20040317-003", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "name": "20040317 Re: New OpenSSL releases fix denial of service attacks [17 March 2004]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "name": "RHSA-2004:121", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "CLA-2004:834", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "20040304-01-U", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc" }, { "name": "openssl-tls-dos(15509)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "FEDORA-2004-095", "refsource": "FEDORA", "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "name": "57524", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "oval:org.mitre.oval:def:871", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "name": "oval:org.mitre.oval:def:11755", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" }, { "name": "VU#465542", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/465542" }, { "name": "TA04-078A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "GLSA-200403-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "11139", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "RHSA-2004:119", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "name": "oval:org.mitre.oval:def:902", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "name": "RHSA-2004:139", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "name": "2004-0012", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "DSA-465", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-465" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0081", "datePublished": "2004-03-18T05:00:00", "dateReserved": "2004-01-19T00:00:00", "dateUpdated": "2024-08-08T00:01:23.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0081\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-11-23T05:00:00.000\",\"lastModified\":\"2021-11-08T15:48:31.743\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.\"},{\"lang\":\"es\",\"value\":\"OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CAFC15-178C-4176-9668-D4A04B63E77B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C8D6949-89F4-40EF-98F4-8D15628DC345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1_\\\\(3.005\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:2.1_\\\\(0.208\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6479D85C-1A12-486D-818C-6679F415CA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"287CF5FA-D0EC-4FD7-9718-973587EF34DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88168D4-7DB5-4720-8640-400BB680D0FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968915A1-375B-4C69-BE11-9A393F7F1B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11465DCA-72E5-40E9-9D8E-B3CD470C47E9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3954D0D1-9FDF-47D0-9710-D0FB06955B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4C5F60-B32D-4D85-BA28-AE11972ED614\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5935C3-3D83-461F-BC26-E03362115C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AC523B-3106-46F2-B760-803DCF8061F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B8D6F3-D15D-489F-A807-17E63F4831F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808189BA-197F-49CE-933E-A728F395749C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7EF0CD-EA39-457B-8E2E-9120B65A5835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC2983F-5212-464B-AC21-8A897DEC1F58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF17989-D1F2-4B04-80BD-CFABDD482ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2D00AC-FA2A-4C39-B796-DC19072862CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441BE3A0-20F4-4972-B279-19B3DB5FA14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D33C6EF-DBE1-4943-83E4-1F10670DAC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EAEA17-033A-4A50-8E39-D61154876D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE93350-92E6-4F5C-A14C-9993CFFDBCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9F2B04-A1F2-4788-A53D-C8274A758DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5309ED-D84F-4F52-9864-5B0FEEEE5022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C441E-444B-4DF5-8491-86805C70FB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32310AFE-38CC-4C6C-AE13-54C18720F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC46909F-DDFC-448B-BCDF-1EB343F96630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9496279F-AB43-4B53-81A6-87C651ABC4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE2E73-9536-41A9-B83B-0A06B54857F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E562907F-D915-4030-847A-3C6834A80D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138985E6-5107-4E8B-A801-C3D5FE075227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038FEDE7-986F-4CA5-9003-BA68352B87D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E140F76-D078-4F58-89CF-3278CDCB9AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D76A8D-832B-411E-A458-186733C66010\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580BA1FE-0826-47A7-8BD3-9225E0841EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040B04CD-B891-4F19-A7CC-5C2D462FBD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF29685-7FFC-4093-A1D4-21E4871AF5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72872C9-63AF-417F-BFAE-92B4D350C006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BCF196-5E5A-4F31-BCE7-AA0C748CA922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970939C5-1E6F-47B6-97E6-7B2C1E019985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1F4148-E772-4708-8C1F-D67F969C11DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEBCEF0-5982-4B30-8377-9CAC978A1CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09458CD7-D430-4957-8506-FAB2A3E2AA65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B87C95-4B34-4628-AD03-67D1DE13E097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758F95DB-E619-4B08-86FA-6CF2C1B0CBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F04471C-732F-44EE-AD1B-6305C1DD7DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3499913B-5DCD-4115-8C7B-9E8AFF79DE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E237919A-416B-4039-AAD2-7FAE1F4E100D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39149924-188C-40C1-B598-A9CD407C90DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D5780C-4E29-4BCA-A47E-29FF6EAF33FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6501108-5455-48FE-AA82-37AFA5D7EC24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*\",\"matchCriteriaId\":\"C1A3B951-A1F8-4291-82FA-AB7922D13ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2E7C81-C0F5-4D36-9A23-03BE69295ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0EF4A3-2FE5-41E4-A764-30B379ECF081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF6D59E-8AEA-4380-B86B-0803B2202F16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140ABF28-FA39-4D77-AEB2-304962ED48C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09473DD9-5114-44C5-B56C-6630FBEBCACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7ECD3A4-5A39-4222-8350-524F11D8FFB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D36C140D-E80C-479A-ADA7-18E901549059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"940712E9-B041-4B7F-BD02-7DD0AE596D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B887A2-9025-4C5B-8901-71BC63BF5293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33264586-7160-4550-9FF9-4101D72F5C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE5E6521-0611-4473-82AC-21655F10FEC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*\",\"matchCriteriaId\":\"AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*\",\"matchCriteriaId\":\"8C83ABA2-87CD-429B-9800-590F8256B064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D9A576-2878-4AC4-AC95-E69CB8A84A71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A1A0B02-CF33-401F-9AB2-D595E586C795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0EF3F0-B82E-45B7-8D05-05E76009F7A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90FB3825-21A6-4DBE-8188-67672DBE01CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"80623E58-8B46-4559-89A4-C329AACF3CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE6C228-CD93-4636-868B-C19BC1674BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A645148C-AD0D-46C1-BEE3-10F5C9066279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D69187C-7F46-4FF0-A8A0-0E1989EA79BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C48F4DF4-8091-45D0-9F80-F760500B1202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02029D75-FAF2-4842-9246-079C7DE36417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8496E0D-2507-4C25-A122-0B846CBCA72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E383F2A-DFCF-47F8-94EE-3563D41EA597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D87EF0-056E-4128-89EB-2803ED83DEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB3163C1-2044-44DA-9C88-076D75FDF1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E1B690-C58B-4C08-A757-F3DF451FDAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F0E14C-7681-4D1A-B982-A51E450B93A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF39E8B-C201-4940-81C9-14AF4C3DD4B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC604680-2E9E-4DC4-ACDD-74D552A45BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A94436-D092-4C7E-B87B-63BC621EE82E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"862165CF-3CFB-4C6E-8238-86FA85F243C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056F3336-BAA8-4A03-90B4-7B31710FC1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FDC2510-FBB9-429A-B6D4-10AB11F93960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D45127E-A544-40A0-9D34-BD70D95C9772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C69C3E-C895-45C8-8182-7BB412A0C828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D9564B-B92E-4C97-87FF-B56D62DCA775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B931D4F8-23F5-4ABA-A457-959995D30C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6A023E-9C2A-487F-B5CE-674C766BFE75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A15ACA2-D500-4260-B51A-6FE6AB5A45A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A045971-8756-47E8-9044-C39D08B36F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA95881-7231-4FDA-AF73-04DF9FF0B64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B7F6AD-EDBD-4B09-BDB2-795ED114F2AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F045AB7B-1551-46E5-A5CC-BF13C1BB49F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E85930-3AAD-420B-8E3E-AEC57344F6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FD4485-BCA2-485A-A0CF-F8152C9DBFA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF53BE4-FE2D-4D63-BD0F-A423D0FE3BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00993464-BE09-4691-B3F0-51BBA9FB80C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896AB39E-2078-4BA2-9522-477BD5F98FD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9279EC-47CF-45F1-B4CC-B2B332E82E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7300C3E-8105-4C23-89B9-7D29CED18C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C59DB2-48DA-4172-A1F5-25CF3B5097AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"715F4E0B-7E4B-4520-A987-9B3ED3136B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA1F606-C558-40FD-9300-6E2796F47BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A037FAA6-6D26-4496-BC67-03475B4D1155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3831DD3-E783-4200-8986-FDBF7DD9BA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699764B6-0F86-4AB0-86A3-4F2E69AD820C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7562ADC4-0D01-4FC2-98F0-1F4041BDA52E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6FAB588-BDBE-4A04-AB9E-4F700A3951F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B83F84-D1EF-43B4-8620-3C1BCCE44553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41169D2F-4F16-466A-82E9-AD0735472B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"947699C3-D9DE-411A-99C0-44ADD1D2223A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15F668C0-8420-4401-AB0F-479575596CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDCC7B6-34CA-4551-9833-306B93E517BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D69C160-39F7-48B8-B9A3-CC86690453C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"166BF638-ABDC-4BB9-BD4E-2B22681AD9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA6420B-9F6A-48F4-A445-12B60A320347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180D07AE-C571-4DD6-837C-43E2A946007A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90789533-C741-4B1C-A24B-2C77B9E4DE5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1520065B-46D7-48A4-B9D0-5B49F690C5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA526B9-726A-49D5-B3CA-EBE2DA303CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494E48E7-EF86-4860-9A53-94F6C313746E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A518E8-21BE-4C5C-B425-410AB1208E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3AB748-E463-445C-ABAB-4FEDDFD1878B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"660E4B8D-AABA-4520-BC4D-CF8E76E07C05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"85BFEED5-4941-41BB-93D1-CD5C2A41290E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E79A05-64F3-4397-952C-A5BB950C967D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549BB01D-F322-4FE3-BDA2-4FEA8ED8568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"09F3FB7B-0F68-49F3-A3B7-977A687A42E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"088F2FF7-96E5-455E-A35B-D99F9854EC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"FFA721BF-1B2E-479F-BF25-02D441BF175B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*\",\"matchCriteriaId\":\"AFEDCE49-21CC-4168-818F-4C638EE3B077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*\",\"matchCriteriaId\":\"B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26430687-409B-448F-934B-06AB937DDF63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0702A32E-E577-403C-B4D9-15037D7100A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DC217F-C257-4A3C-9CBD-08010C30BEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0F78F4-E81E-4C6B-AB73-D6AAE191060E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1A5808-6D5D-48AD-9470-5A6510D17913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1E8990D-D9A0-4A71-9D87-EC047E01B0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D09E11C-C5BB-409E-BB0D-7F351250419B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B06A05D-AA31-441D-9FC2-3558648C3B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0886901-6F93-44C1-B774-84D7E5D9554C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F203A80-7C1E-4A04-8E99-63525E176753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA0A204C-158B-4014-A53C-75E0CD63E0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"085BA581-7DA5-4FA4-A888-351281FD0A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1C4B3C-5701-4233-BA94-28915713F9C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D9F8D7-698A-486A-918A-7DB5CAFBB3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125C2A0-A4B5-48D6-A38A-54755C3FDF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F85F672-0F21-4AD7-8620-13D82F2ECC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89070041-613A-4F7B-BD6A-C6091D21FC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A71933-4BD5-4B11-8B14-D997E75F29CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6BE11D-FC02-4950-A554-08CC9D8B1853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A53FD0E1-9BAA-43F0-BCC9-0BE8D4356F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B80ADAE8-94D4-46A4-A5ED-FF134D808B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69FA0221-5073-4D45-950F-119497B53FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AE5B43-7C90-4C2A-A215-30F5EC5841C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC1A110-B203-4962-8E1A-74BD98121AF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A92C4D-B024-4D39-9479-409C39586F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E0C4F5-CF02-4FF6-AE9B-5B6B70D5C067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E8998CC-E372-46D0-8339-47DC8D92D253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF131FDC-BF8D-4A17-99F0-444EB900E83D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"880811B3-E78E-456E-972E-DE733F368576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22411F18-2B93-405A-A3B5-2CF0A04977C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71188B7-E6DC-41E5-B619-367341113501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07491444-0196-4504-A971-A5E388B86BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC6CD2-3291-4E69-8DC6-F3AB853F8931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD43EDDF-58A7-4705-B8C7-FD76C35A437D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C2E603-568F-40F6-9A7C-439E2A51B37F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703421A7-E8C5-450B-97EF-FD9D99D4B834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9519BCB2-B401-44CE-97F6-847BB36AE45F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE573E8-DD94-4293-99AE-27B9067B3ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14413DA-5199-4282-9E22-D347E9D8E469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CC5F49-0E9E-45D8-827D-A5940566DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D94EE19-6CE9-4E02-8174-D9954CDBF02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E4BEE3-AE7B-4481-B724-2E644E18ACC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAAB7052-E0B6-472E-920B-A0F0AEA25D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE38F15-BD42-4171-8670-86AA8169A60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C0BD87-CE4B-49D2-89BE-EF282C43AD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E6C4A8-59F4-43EE-8413-E95289037598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76357A-27E6-4D85-9AA0-1BB658C41568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C5FDB-24E2-479D-87CA-164CD28567D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D982AE39-BB57-49E7-B5FE-5EF1ADE2F019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DE5E22-DF93-46BE-85A3-D4E04379E901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF28C435-C036-4507-8E3F-44E722F9974A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA957E2-ABF9-49B2-874F-3FC3060CE0B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2CDFE7-6853-4A31-85C0-50C57A8D606A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2ED90B-DDBA-49DE-AC78-20E7D77C8858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408A9DB0-81EF-4186-B338-44954E67289B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303362A5-9C3C-4C85-8C97-2AB12CE01BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED22DC1-E06B-4511-B920-6DAB792262D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE44CA7-4BC7-4C2B-948F-2ACABB91528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F757B2A7-869F-4702-81EB-466317A79D61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01F6E9A9-6C85-48DA-BC61-55F8EACCB59F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64AF1E33-4086-43E2-8F54-DA75A99D4B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D16F03-A4C7-4497-AB74-499F208FF059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A33EC1-836B-4C8C-AC18-B5BD4F90E612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BE9C02-2A01-4F6F-A6BD-BC0173561E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C558CED8-8342-46CB-9F52-580B626D320E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F85D19E-6C26-429D-B876-F34238B9DAAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4.101\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09063867-0E64-4630-B35B-4CCA348E4DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F98CD7-A352-483C-9968-8FB2627A7CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F97FE485-705F-4707-B6C6-0EF9E8A85D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B925E8-D2C2-4E8C-AC21-0C422245C482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9170562-872E-4C32-869C-B10FF35A925E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0927A68-8BB2-4F03-8396-E9CACC158FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"559DDBA3-2AF4-4A0C-B219-6779BA931F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226C9CC-6933-4F10-B426-B47782C606FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757DAE9A-B25D-4B8A-A41B-66C2897B537E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3DC170-E279-4725-B9EE-6840B5685CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8091EDA9-BD18-47F7-8CEC-E086238647C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F867890-74A4-4892-B99A-27DB4603B873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE05B514-F094-4632-B25B-973F976F6409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3392428D-1A85-4472-A276-C482A78E2CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.102\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40954985-16E6-4F37-B014-6A55166AE093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.109\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C097809-1FEF-4417-A201-42291CC29122\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fedoranews.org/updates/FEDORA-2004-095.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2004-119.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/11139\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200403-03.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-465\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/465542\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-120.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-121.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-139.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/9899\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2004/0012\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.uniras.gov.uk/vuls/2004/224012/index.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA04-078A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15509\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902\",\"source\":\"cve@mitre.org\"}]}}" } }
ghsa-pcwf-qwvv-qjg3
Vulnerability from github
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
{ "affected": [], "aliases": [ "CVE-2004-0081" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-11-23T05:00:00Z", "severity": "MODERATE" }, "details": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "id": "GHSA-pcwf-qwvv-qjg3", "modified": "2022-05-03T03:12:54Z", "published": "2022-05-03T03:12:54Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "type": "WEB", "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/11139" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "type": "WEB", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-465" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/465542" }, { "type": "WEB", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/9899" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2004/0012" }, { "type": "WEB", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2004-0081
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0081", "description": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "id": "GSD-2004-0081", "references": [ "https://www.suse.com/security/cve/CVE-2004-0081.html", "https://www.debian.org/security/2004/dsa-465", "https://access.redhat.com/errata/RHSA-2004:139", "https://access.redhat.com/errata/RHSA-2004:121", "https://access.redhat.com/errata/RHSA-2004:120", "https://access.redhat.com/errata/RHSA-2004:119" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0081" ], "details": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "id": "GSD-2004-0081", "modified": "2023-12-13T01:22:54.545804Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9899", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9899" }, { "name": "ESA-20040317-003", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "name": "20040317 Re: New OpenSSL releases fix denial of service attacks [17 March 2004]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "name": "RHSA-2004:121", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "CLA-2004:834", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "20040304-01-U", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc" }, { "name": "openssl-tls-dos(15509)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "FEDORA-2004-095", "refsource": "FEDORA", "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "name": "57524", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "oval:org.mitre.oval:def:871", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "name": "oval:org.mitre.oval:def:11755", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" }, { "name": "VU#465542", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/465542" }, { "name": "TA04-078A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "GLSA-200403-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "11139", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "RHSA-2004:119", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "name": "oval:org.mitre.oval:def:902", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "name": "RHSA-2004:139", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "name": "2004-0012", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "DSA-465", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-465" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0081" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "VU#465542", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/465542" }, { "name": "9899", "refsource": "BID", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9899" }, { "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "refsource": "MISC", "tags": [], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "CLA-2004:834", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "ESA-20040317-003", "refsource": "ENGARDE", "tags": [], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "name": "DSA-465", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-465" }, { "name": "RHSA-2004:119", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2004-119.html" }, { "name": "RHSA-2004:121", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "SCOSA-2004.10", "refsource": "SCO", "tags": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "20040304-01-U", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc" }, { "name": "57524", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "TA04-078A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "refsource": "CISCO", "tags": [], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "FEDORA-2004-095", "refsource": "FEDORA", "tags": [], "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "name": "GLSA-200403-03", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "RHSA-2004:120", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "RHSA-2004:139", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "name": "2004-0012", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "11139", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/11139" }, { "name": "20040317 Re: New OpenSSL releases fix denial of service attacks [17 March 2004]", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "name": "20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "name": "openssl-tls-dos(15509)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "name": "oval:org.mitre.oval:def:902", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902" }, { "name": "oval:org.mitre.oval:def:871", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871" }, { "name": "oval:org.mitre.oval:def:11755", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2021-11-08T15:48Z", "publishedDate": "2004-11-23T05:00Z" } } }
var-200411-0173
Vulnerability from variot
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. Oracle has released a Critical Patch Update to address these issues in various supported applications and platforms. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. This BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database.
TITLE: Fedora update for openssl096b
SECUNIA ADVISORY ID: SA17381
VERIFY ADVISORY: http://secunia.com/advisories/17381/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/
DESCRIPTION: Fedora has issued an update for openssl096b. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
For more information: SA10133 SA11139
SOLUTION: Apply updated packages.
Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
8d68e4b430aa7c5ca067c12866ae694e SRPMS/openssl096b-0.9.6b-21.42.src.rpm 54a9e78a2fdd625b9dc9121e09eb4398 x86_64/openssl096b-0.9.6b-21.42.x86_64.rpm c5c6174e23eba8d038889d08f49231b8 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm 56b63fc150d0c099b2e4f0950e21005b x86_64/openssl096b-0.9.6b-21.42.i386.rpm 56b63fc150d0c099b2e4f0950e21005b i386/openssl096b-0.9.6b-21.42.i386.rpm 93195495585c7e9789041c75b1ed5380 i386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm
OTHER REFERENCES: SA10133: http://secunia.com/advisories/10133/
SA11139: http://secunia.com/advisories/11139/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0173", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "propack", "scope": "eq", "trust": 2.1, "vendor": "sgi", "version": "2.4" }, { "model": "propack", "scope": "eq", "trust": 2.1, "vendor": "sgi", "version": "2.3" }, { "model": "sg5", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.4" }, { "model": "sg5", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.3" }, { "model": "sg5", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.2" }, { "model": "sg208", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.4" }, { "model": "sg203", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.31.29" }, { "model": "sg203", "scope": "eq", "trust": 1.9, "vendor": "avaya", "version": "4.4" }, { "model": "openssl", "scope": "eq", "trust": 1.8, "vendor": "openssl", "version": "0.9.6c" }, { "model": "gsx server", "scope": "eq", "trust": 1.3, "vendor": "vmware", "version": "2.5.1" }, { "model": "gsx server", "scope": "eq", "trust": 1.3, "vendor": "vmware", "version": "2.0" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.2.4" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "servercluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5.2" }, { "model": "servercluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "propack", "scope": "eq", "trust": 1.3, "vendor": "sgi", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.4" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.3" }, { "model": "imanager", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "2.0" }, { "model": "imanager", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "1.5" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.7" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.6.2" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.5.27" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.5" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.11" }, { "model": "apache-based web server", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "2.0.43.04" }, { "model": "apache-based web server", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "2.0.43.00" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.2" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.9" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.8" }, { "model": "webns", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "7.10" }, { "model": "webns", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "6.10" }, { "model": "secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10000" }, { "model": "okena stormwatch", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "3.2" }, { "model": "firewall services module", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.1.3" }, { "model": "firewall services module", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.1.2" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.0" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.2" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.1" }, { "model": "sg200", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.31.29" }, { "model": "sg200", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.4" }, { "model": "converged communications server", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.3.1" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.3" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.4" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.3" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.2" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.1" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "4.0" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.03" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "10000_r2.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.3_rc3" }, { "model": "provider-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "4.1" }, { "model": "pix firewall", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2.2_.111" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1_0.1.02" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00.00" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2000_r2.0.1" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "1_3.0" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.0.1" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(3\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(1\\)" }, { "model": "application and content networking software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "css11000 content services switch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "proxysg", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "*" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.05.08" }, { "model": "cacheos ca sa", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "4.1.10" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp0" }, { "model": "edirectory", "scope": "eq", "trust": 1.0, "vendor": "novell", "version": "8.5.12a" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.02" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(1\\)" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.2.1" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(3\\)" }, { "model": "sg208", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(3.109\\)" }, { "model": "clientless vpn gateway 4400", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "5.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4.101\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(1\\)" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "100_r2.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3.1" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.1" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.10_.0.06s" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "5.2.1" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "3.0_build_7592" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.01" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.30" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.2.2" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3\\)" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "1_2.0" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "2.0.1_build_2129" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "s3210" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.0" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2_0.0.03" }, { "model": "content services switch 11500", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)" }, { "model": "crypto accelerator 4000", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "8.05" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5.1.46" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "500" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(2\\)" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "2.5.1_build_5336" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.3.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp0" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.0" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.04" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e12" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11\\)e" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(19\\)e1" }, { "model": "call manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aaa server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "gss 4480 global site selector", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5000_r2.0.1" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.1_\\(0.208\\)" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e14" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.3_rc1" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2za" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.3_rc2" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00.01" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.1" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.0.2" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.2_rc1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "cacheos ca sa", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "4.1.12" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.0.3" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.7" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "*" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp1" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.00" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4\\)" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "7500_r2.0.1" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.40" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5x" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "2.0" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1_\\(3.005\\)" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(5\\)" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.10_b4" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(14\\)sy" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(3.102\\)" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.1.1" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "2.0" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.20" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(1\\)" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.1" }, { "model": "access registrar", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3.100\\)" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(14\\)sy1" }, { "model": "gss 4490 global site selector", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "2.5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(13\\)e9" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sy" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.6b-3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2" }, { "model": "speed technologies litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "lite", "version": "1.2_rc2" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "3.0" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "s3400" }, { "model": "mds 9000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.1.02" }, { "model": "threat response", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.6-15" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp1" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "vsx_ng_with_application_intelligence" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.6" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1_0.2.06" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.7a-2" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(4\\)" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netscreen", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "0.9.6b" }, { "model": "vine linux", "scope": "eq", "trust": 0.8, "vendor": "vine linux", "version": "2.5" }, { "model": "vine linux", "scope": "eq", "trust": 0.8, "vendor": "vine linux", "version": "2.6" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1000 v1.0" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1000 v1.1" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "4000 v1.0" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "500" }, { "model": "netscreen idp", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "2.0 - 2.1r6" }, { "model": "netscreen ive", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "turbolinux advanced server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (hosting)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (workgroup)" }, { "model": "turbolinux desktop", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.1" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.5" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.0" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux workstation", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "firewall-1 gx", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "v2.0" }, { "model": "provider-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng and later" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ng and later" }, { "model": "vpn-1/firewall-1", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "vsx ng with application intelligence" }, { "model": "trendmicro interscan viruswall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "3.81" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "hp-ux aaa server", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "a.06.01.02.04" }, { "model": "hp-ux aaa server", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "a.06.01.02.06" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "ipcom series", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "( for details" }, { "model": "ipcom series", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "check the information provided by the vendor. )" }, { "model": "netshelter series", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "( for details" }, { "model": "netshelter series", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "check the information provided by the vendor. )" }, { "model": "netwatcher", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "( sensor device )" }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "7110" }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "7115" }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "7117" }, { "model": "ios 12.1 e", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "sg208", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.07592" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.15336" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.12129" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.40" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.30" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.200" }, { "model": "clientless vpn gateway series", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "44005.0" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "40001.0" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for isa server", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for gauntlet", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.24" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.23" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.1.02" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.1" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.04" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.03" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.02" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.01" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.3" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.1" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.1" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.0.1" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.0" }, { "model": "openssl096b-0.9.6b-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl096-0.9.6-15.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-perl-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-devel-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "hat fedora core3", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat fedora core2", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat fedora core1", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "edirectory su1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.12" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3.1" }, { "model": "litespeed web server rc3", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server rc2", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server rc1", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2.1" }, { "model": "litespeed web server rc2", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2" }, { "model": "litespeed web server rc1", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.1.1" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.1" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.1" }, { "model": "wbem a.02.00.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem a.02.00.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem a.01.05.08", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.5" }, { "model": "aaa server", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "associates etrust security command center", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.13" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.12" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.1" }, { "model": "webns .0.06s", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.20.0.03" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.2.06" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.1.02" }, { "model": "webns b4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.10" }, { "model": "threat response", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.109)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.102)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.5" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4.101)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "ios 12.2za", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sy1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e14", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e12", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ec", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ea1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1(0.208)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1(3.005)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "css11500 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "call manager", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software vpn-1 vsx ng with application intelligence", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software providor-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 vsx ng with application intelligence", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 gx", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "2.0" }, { "model": "coat systems proxysg", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.12" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7500" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5x0" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5000" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5000" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "50" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2000" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "10000" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "100" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.4" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.3" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "sg208", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity r5 r5.1.46", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity audix r5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "intuity s3400", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity s3210", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "gsx server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.5.2" }, { "model": "stonegate sparc", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.12" }, { "model": "stonegate", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.5x86" }, { "model": "stonegate ibm zseries", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.5" }, { "model": "computing sidewinder", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "5.2.1.10" }, { "model": "security bsafe ssl-j sdk", "scope": "ne", "trust": 0.3, "vendor": "rsa", "version": "4.1" }, { "model": "project openssl d", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl m", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "litespeed web server", "scope": "ne", "trust": 0.3, "vendor": "lite speed", "version": "1.3.2" }, { "model": "litespeed web server", "scope": "ne", "trust": 0.3, "vendor": "lite speed", "version": "1.0.2" }, { "model": "secure gateway for solaris", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "1.14" }, { "model": "threat response", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.0.3" }, { "model": "mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90002.0(0.86)" }, { "model": "mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90001.3(3.33)" }, { "model": "point software vpn-1 sp6", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5a", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp4", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp6", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5a", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "webstar", "scope": "ne", "trust": 0.3, "vendor": "4d", "version": "5.3.2" }, { "model": "oneworld xe/erp8 applications sp22", "scope": null, "trust": 0.3, "vendor": "peoplesoft", "version": null }, { "model": "enterpriseone applications", "scope": "eq", "trust": 0.3, "vendor": "peoplesoft", "version": "8.93" }, { "model": "enterpriseone applications sp2", "scope": "eq", "trust": 0.3, "vendor": "peoplesoft", "version": "8.9" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "oracle9i application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "oracle8i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7.4" }, { "model": "oracle8i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7.4.0" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.1" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.0" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.0" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.9" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.8" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.7" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.6" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.5" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.4" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.3" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.2" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.1" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.0" }, { "model": "collaboration suite release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "29.0.4.2" }, { "model": "collaboration suite release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "29.0.4.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#465542" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0081" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Litchfield\u203b david@nextgenss.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200411-078" } ], "trust": 0.6 }, "cve": "CVE-2004-0081", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0081", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-8511", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0081", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#465542", "trust": 0.8, "value": "5.16" }, { "author": "CNNVD", "id": "CNNVD-200411-078", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-8511", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#465542" }, { "db": "VULHUB", "id": "VHN-8511" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. \nFor the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. \nThe second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. \nThis entry will be retired when individual BID records are created for each issue. \n*Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. \nOracle has released a Critical Patch Update to address these issues in various supported applications and platforms. \nThe issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. \nThis BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database. \n\nTITLE:\nFedora update for openssl096b\n\nSECUNIA ADVISORY ID:\nSA17381\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17381/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nFedora Core 3\nhttp://secunia.com/product/4222/\n\nDESCRIPTION:\nFedora has issued an update for openssl096b. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service). \n\nFor more information:\nSA10133\nSA11139\n\nSOLUTION:\nApply updated packages. \n\nFedora Core 3:\nhttp://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/\n\n8d68e4b430aa7c5ca067c12866ae694e\nSRPMS/openssl096b-0.9.6b-21.42.src.rpm\n54a9e78a2fdd625b9dc9121e09eb4398\nx86_64/openssl096b-0.9.6b-21.42.x86_64.rpm\nc5c6174e23eba8d038889d08f49231b8\nx86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm\n56b63fc150d0c099b2e4f0950e21005b\nx86_64/openssl096b-0.9.6b-21.42.i386.rpm\n56b63fc150d0c099b2e4f0950e21005b\ni386/openssl096b-0.9.6b-21.42.i386.rpm\n93195495585c7e9789041c75b1ed5380\ni386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm\n\nOTHER REFERENCES:\nSA10133:\nhttp://secunia.com/advisories/10133/\n\nSA11139:\nhttp://secunia.com/advisories/11139/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CERT/CC", "id": "VU#465542" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" }, { "db": "VULHUB", "id": "VHN-8511" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" } ], "trust": 3.15 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#465542", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2004-0081", "trust": 3.1 }, { "db": "BID", "id": "9899", "trust": 2.8 }, { "db": "USCERT", "id": "TA04-078A", "trust": 2.5 }, { "db": "SECUNIA", "id": "11139", "trust": 1.7 }, { "db": "SECTRACK", "id": "1009458", "trust": 0.8 }, { "db": "XF", "id": "15509", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000087", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200411-078", "trust": 0.7 }, { "db": "BID", "id": "13139", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-8511", "trust": 0.1 }, { "db": "SECUNIA", "id": "17398", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41200", "trust": 0.1 }, { "db": "SECUNIA", "id": "17381", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41105", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#465542" }, { "db": "VULHUB", "id": "VHN-8511" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "id": "VAR-200411-0173", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8511" } ], "trust": 0.52271296 }, "last_update_date": "2023-12-18T11:48:29.371000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OpenSSL Vulnerability", "trust": 0.8, "url": "http://www.checkpoint.com/services/techsupport/alerts/openssl.html" }, { "title": "HPSBUX01011", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00897351" }, { "title": "HPSBUX01011", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux01011.html" }, { "title": "NetScreen Advisory 58466", "trust": 0.8, "url": "http://www.juniper.net/support/security/alerts/adv58466-2.txt" }, { "title": "openssl096", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=155" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.openssl.org/" }, { "title": "RHSA-2004:119", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-119.html" }, { "title": "RHSA-2004:121", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-121.html" }, { "title": "RHSA-2004:120", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-120.html" }, { "title": "20040304-01-U", "trust": 0.8, "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc" }, { "title": "57571", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-1" }, { "title": "57524", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-1" }, { "title": "57571", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-3" }, { "title": "57524", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-3" }, { "title": "19387", "trust": 0.8, "url": "http://kb.trendmicro.com/solutions/solutiondetail.asp?solutionid=19387" }, { "title": "TLSA-2004-9", "trust": 0.8, "url": "http://www.turbolinux.com/security/2004/tlsa-2004-9.txt" }, { "title": "OpenSSL \u306b\u95a2\u3059\u308b\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.checkpoint.co.jp/techsupport/alerts/openssl.html" }, { "title": "RHSA-2004:120", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-120j.html" }, { "title": "RHSA-2004:119", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-119j.html" }, { "title": "openssl \u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30db\u30fc\u30eb", "trust": 0.8, "url": "http://vinelinux.org/errata/25x/20040319-1.html" }, { "title": "TLSA-2004-9", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2004/tlsa-2004-9j.txt" }, { "title": "IPCOM\u30b7\u30ea\u30fc\u30ba\u306eOpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://primeserver.fujitsu.com/ipcom/support/security20040325/" }, { "title": "[\u91cd\u8981] OpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://jp.fujitsu.com/support/security/backnumber/2004/0325/" }, { "title": "224012", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/niscc.html#224012-openssl" }, { "title": "OpenSSL Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=169015" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0081" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/9899" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta04-078a.html" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/465542" }, { "trust": 2.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-119.html" }, { "trust": 2.0, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "trust": 1.7, "url": "http://www.debian.org/security/2004/dsa-465" }, { "trust": 1.7, "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "trust": 1.7, "url": "http://fedoranews.org/updates/fedora-2004-095.shtml" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11755" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a871" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a902" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-120.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-121.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-139.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11139" }, { "trust": 1.7, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "trust": 1.7, "url": "http://www.trustix.org/errata/2004/0012" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509" }, { "trust": 1.6, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2" }, { "trust": 1.1, "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt" }, { "trust": 1.1, "url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc" }, { "trust": 0.8, "url": "http://www.openssl.org" }, { "trust": 0.8, "url": "http://cvs.openssl.org/chngview?cn=5721" }, { "trust": 0.8, "url": "http://cvs.openssl.org/chngview?cn=5722" }, { "trust": 0.8, "url": "http://cvs.openssl.org/getfile?v=1.618.2.137\u0026f=openssl/changes" }, { "trust": 0.8, "url": "http://cvs.openssl.org/getfile?v=1.954\u0026f=openssl/changes" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0081" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/15509" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041201.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041301.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041701.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041801.txt" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-224012" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta04-078a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta04-078a" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0081" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2004/mar/1009458.html" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20040318_082932.html" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524" }, { "trust": 0.3, "url": "http://www.4d.com/products/4dwsv.html" }, { "trust": 0.3, "url": "http://support.avaya.com/japple/css/japple?page=avaya.css.openpage\u0026temp.template.name=securityadvisory" }, { "trust": 0.3, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000827" }, { "trust": 0.3, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000834" }, { "trust": 0.3, "url": "ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt" }, { "trust": 0.3, "url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256" }, { "trust": 0.3, "url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257" }, { "trust": 0.3, "url": "http://www.netscreen.com/services/security/alerts/adv58466-signed.txt" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3123.html" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-239.htm" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/alerts/openssl.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-120.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-139.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-830.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html" }, { "trust": 0.3, "url": "http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm" }, { "trust": 0.3, "url": "http://www.securecomputing.com/pdf/52110relnotes.pdf" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571" }, { "trust": 0.3, "url": "http://www.tarantella.com/security/bulletin-10.html" }, { "trust": 0.3, "url": "http://www.adiscon.com/common/en/advisory/2004-03-18.asp" }, { "trust": 0.3, "url": "http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt" }, { "trust": 0.3, "url": "http://www.litespeedtech.com" }, { "trust": 0.3, "url": "/archive/1/357672" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf" }, { "trust": 0.3, "url": "http://www.oracle.com/index.html" }, { "trust": 0.3, "url": "http://www.peoplesoft.com:80/corp/en/support/security_index.jsp" }, { "trust": 0.3, "url": "/archive/1/395699" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/11139/" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=107955049331965\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108403850228012\u0026amp;w=2" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000834" }, { "trust": 0.1, "url": "http://secunia.com/product/48/" }, { "trust": 0.1, "url": "http://rhn.redhat.com/errata/rhsa-2005-829.html" }, { "trust": 0.1, "url": "http://rhn.redhat.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/1326/" }, { "trust": 0.1, "url": "http://secunia.com/product/1306/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17398/" }, { "trust": 0.1, "url": "http://secunia.com/product/1044/" }, { "trust": 0.1, "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/" }, { "trust": 0.1, "url": "http://secunia.com/product/4222/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17381/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/10133/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#465542" }, { "db": "VULHUB", "id": "VHN-8511" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#465542" }, { "db": "VULHUB", "id": "VHN-8511" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" }, { "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "NVD", "id": "CVE-2004-0081" }, { "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-03-17T00:00:00", "db": "CERT/CC", "id": "VU#465542" }, { "date": "2004-11-23T00:00:00", "db": "VULHUB", "id": "VHN-8511" }, { "date": "2004-03-17T00:00:00", "db": "BID", "id": "9899" }, { "date": "2005-04-12T00:00:00", "db": "BID", "id": "13139" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "date": "2005-11-03T01:02:14", "db": "PACKETSTORM", "id": "41200" }, { "date": "2005-11-02T01:11:22", "db": "PACKETSTORM", "id": "41105" }, { "date": "2004-11-23T05:00:00", "db": "NVD", "id": "CVE-2004-0081" }, { "date": "2003-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-05-06T00:00:00", "db": "CERT/CC", "id": "VU#465542" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-8511" }, { "date": "2015-03-19T08:20:00", "db": "BID", "id": "9899" }, { "date": "2006-05-05T23:30:00", "db": "BID", "id": "13139" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000087" }, { "date": "2021-11-08T15:48:31.743000", "db": "NVD", "id": "CVE-2004-0081" }, { "date": "2021-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-078" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL does not properly handle unknown message types", "sources": [ { "db": "CERT/CC", "id": "VU#465542" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "9899" }, { "db": "BID", "id": "13139" } ], "trust": 0.6 } }
rhsa-2004_121
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix several remote denial of service\nvulnerabilities are now available.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a null-pointer assignment in the do_change_cipher_spec() function\nin OpenSSL 0.9.6c-0.9.6l and 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully-crafted SSL/TLS handshake against a server that used\nthe OpenSSL library in such a way as to cause OpenSSL to crash. Depending\non the application this could lead to a denial of service. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0079 to this issue.\n\nStephen Henson discovered a flaw in the SSL/TLS handshaking code when using\nKerberos ciphersuites in OpenSSL 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully-crafted SSL/TLS handshake against a server configured\nto use Kerberos ciphersuites in such a way as to cause OpenSSL to crash. \nMost applications have no ability to use Kerberos ciphersuites and are\ntherefore unaffected by this issue. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0112 to\nthis issue.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue. This issue affects only the OpenSSL\ncompatibility packages shipped with Red Hat Linux 9.\n\nThese updated packages contain patches provided by the OpenSSL group that\nprotect against these issues.\n\nNOTE: Because server applications are affected by this issue, users are\nadvised to either restart all services using OpenSSL functionality or\nrestart their system after installing these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:121", "url": "https://access.redhat.com/errata/RHSA-2004:121" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_121.json" } ], "title": "Red Hat Security Advisory: : Updated OpenSSL packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-05T16:21:53+00:00", "generator": { "date": "2024-11-05T16:21:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:121", "initial_release_date": "2004-03-17T22:23:00+00:00", "revision_history": [ { "date": "2004-03-17T22:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:21:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 9", "product": { "name": "Red Hat Linux 9", "product_id": "Red Hat Linux 9", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:9" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0079", "discovery_date": "2004-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617140" } ], "notes": [ { "category": "description", "text": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0079" }, { "category": "external", "summary": "RHBZ#1617140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0112", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617156" } ], "notes": [ { "category": "description", "text": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0112" }, { "category": "external", "summary": "RHBZ#1617156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617156" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0112", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2004_120
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix several remote denial of service\nvulnerabilities are available for Red Hat Enterprise Linux 3.", "title": "Topic" }, { "category": "general", "text": "The OpenSSL toolkit implements Secure Sockets Layer (SSL v2/v3),\nTransport Layer Security (TLS v1) protocols, and serves as a full-strength\ngeneral purpose cryptography library.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a null-pointer assignment in the do_change_cipher_spec() function\nin OpenSSL 0.9.6c-0.9.6k and 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully crafted SSL/TLS handshake against a server that uses\nthe OpenSSL library in such a way as to cause OpenSSL to crash. Depending\non the application this could lead to a denial of service. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0079 to this issue.\n\nStephen Henson discovered a flaw in SSL/TLS handshaking code when using\nKerberos ciphersuites in OpenSSL 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully crafted SSL/TLS handshake against a server configured\nto use Kerberos ciphersuites in such a way as to cause OpenSSL to crash. \nMost applications have no ability to use Kerberos ciphersuites and will\ntherefore be unaffected by this issue. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0112 to\nthis issue.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that may\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue. This issue affects only the OpenSSL\ncompatibility packages shipped with Red Hat Enterprise Linux 3.\n\nThese updated packages contain patches provided by the OpenSSL group that\nprotect against these issues.\n\nAdditionally, the version of libica included in the OpenSSL packages has\nbeen updated to 1.3.5. This only affects IBM s390 and IBM eServer zSeries\ncustomers and is required for the latest openCryptoki packages.\n\nNOTE: Because server applications are affected by this issue, users are\nadvised to either restart all services that use OpenSSL functionality or\nrestart their systems after installing these updates.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:120", "url": "https://access.redhat.com/errata/RHSA-2004:120" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "external", "summary": "117770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117770" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_120.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T16:21:49+00:00", "generator": { "date": "2024-11-05T16:21:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:120", "initial_release_date": "2004-03-17T13:58:00+00:00", "revision_history": [ { "date": "2004-03-17T13:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-05-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:21:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.i686", "product": { "name": "openssl-0:0.9.7a-33.4.i686", "product_id": "openssl-0:0.9.7a-33.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-0:0.9.7a-33.4.ia64", "product_id": "openssl-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-devel-0:0.9.7a-33.4.ia64", "product_id": "openssl-devel-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-perl-0:0.9.7a-33.4.ia64", "product_id": "openssl-perl-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.ia64", "product": { "name": "openssl096b-0:0.9.6b-16.ia64", "product_id": "openssl096b-0:0.9.6b-16.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-0:0.9.7a-33.4.x86_64", "product_id": "openssl-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64", "product_id": "openssl-devel-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64", "product_id": "openssl-perl-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.x86_64", "product": { "name": "openssl096b-0:0.9.6b-16.x86_64", "product_id": "openssl096b-0:0.9.6b-16.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.i386", "product": { "name": "openssl-0:0.9.7a-33.4.i386", "product_id": "openssl-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.i386", "product": { "name": "openssl-devel-0:0.9.7a-33.4.i386", "product_id": "openssl-devel-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.i386", "product": { "name": "openssl-perl-0:0.9.7a-33.4.i386", "product_id": "openssl-perl-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.i386", "product": { "name": "openssl096b-0:0.9.6b-16.i386", "product_id": "openssl096b-0:0.9.6b-16.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.src", "product": { "name": "openssl-0:0.9.7a-33.4.src", "product_id": "openssl-0:0.9.7a-33.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=src" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.src", "product": { "name": "openssl096b-0:0.9.6b-16.src", "product_id": "openssl096b-0:0.9.6b-16.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ppc64", "product": { "name": "openssl-0:0.9.7a-33.4.ppc64", "product_id": "openssl-0:0.9.7a-33.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-0:0.9.7a-33.4.ppc", "product_id": "openssl-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-devel-0:0.9.7a-33.4.ppc", "product_id": "openssl-devel-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-perl-0:0.9.7a-33.4.ppc", "product_id": "openssl-perl-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.ppc", "product": { "name": "openssl096b-0:0.9.6b-16.ppc", "product_id": "openssl096b-0:0.9.6b-16.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-0:0.9.7a-33.4.s390x", "product_id": "openssl-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-devel-0:0.9.7a-33.4.s390x", "product_id": "openssl-devel-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-perl-0:0.9.7a-33.4.s390x", "product_id": "openssl-perl-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.s390", "product": { "name": "openssl-0:0.9.7a-33.4.s390", "product_id": "openssl-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.s390", "product": { "name": "openssl-devel-0:0.9.7a-33.4.s390", "product_id": "openssl-devel-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.s390", "product": { "name": "openssl-perl-0:0.9.7a-33.4.s390", "product_id": "openssl-perl-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.s390", "product": { "name": "openssl096b-0:0.9.6b-16.s390", "product_id": "openssl096b-0:0.9.6b-16.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0079", "discovery_date": "2004-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617140" } ], "notes": [ { "category": "description", "text": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0079" }, { "category": "external", "summary": "RHBZ#1617140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0112", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617156" } ], "notes": [ { "category": "description", "text": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0112" }, { "category": "external", "summary": "RHBZ#1617156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617156" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0112", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2004_139
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated versions of Stronghold 4 cross-platform are available that fix\nsecurity issues affecting OpenSSL and the Apache HTTP Server. A number\nof bug fixes are also included.", "title": "Topic" }, { "category": "general", "text": "Stronghold 4 contains a number of open source technologies, including\nOpenSSL 0.9.6 and the Apache HTTP Server.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a null-pointer assignment in the do_change_cipher_spec() function\nin OpenSSL 0.9.6c-0.9.6k and 0.9.7a-0.9.7c. A remote attacker could\nsend a carefully crafted SSL/TLS handshake which could lead to a denial of\nservice attack. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0079 to this issue.\n\nTesting performed by Novell using a test suite provided by NISCC uncovered\nan issue in the ASN.1 parser in versions of OpenSSL 0.9.6 prior to 0.9.6l\nwhich could cause large recursion and possibly lead to a denial of service\nattack if used where stack space is limited. The Common Vulnerabilities\nand Exposures project (cve.mitre.org) has assigned the name CAN-2003-0851\nto this issue.\n\nAn issue in the handling of regular expressions from configuration files\nwas discovered in releases of the Apache HTTP Server version 1.3 prior to\n1.3.29. To exploit this issue an attacker would need to have the ability\nto write to Apache configuration files such as .htaccess or httpd.conf. A\ncarefully-crafted configuration file can cause an exploitable buffer\noverflow and would allow the attacker to execute arbitrary code in the\ncontext of the server. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2003-0542 to this issue.\n\nUsers of Stronghold 4 cross-platform are advised to update to these errata\nversions, which contain backported security fixes and are not vulnerable to\nthese issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:139", "url": "https://access.redhat.com/errata/RHSA-2004:139" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_139.json" } ], "title": "Red Hat Security Advisory: apache, openssl security update for Stronghold", "tracking": { "current_release_date": "2024-11-05T16:22:11+00:00", "generator": { "date": "2024-11-05T16:22:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:139", "initial_release_date": "2004-03-17T17:20:00+00:00", "revision_history": [ { "date": "2004-03-17T17:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:22:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Stronghold 4", "product": { "name": "Red Hat Stronghold 4", "product_id": "Red Hat Stronghold 4", "product_identification_helper": { "cpe": "cpe:/a:redhat:stronghold:4" } } } ], "category": "product_family", "name": "Stronghold Cross Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0542", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617048" } ], "notes": [ { "category": "description", "text": "Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0542" }, { "category": "external", "summary": "RHBZ#1617048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0542", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0542" } ], "release_date": "2003-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T17:20:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0h patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:139" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2003-0851", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617090" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0851" }, { "category": "external", "summary": "RHBZ#1617090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0851", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0851" } ], "release_date": "2003-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T17:20:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0h patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:139" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0079", "discovery_date": "2004-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617140" } ], "notes": [ { "category": "description", "text": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0079" }, { "category": "external", "summary": "RHBZ#1617140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T17:20:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0h patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:139" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T17:20:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0h patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:139" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2004_119
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix a remote denial of service vulnerability\nare now available for Red Hat Enterprise Linux 2.1.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue.\n\nTesting performed by Novell using a test suite provided by NISCC uncovered\nan issue in the ASN.1 parser in versions of OpenSSL 0.9.6 prior to 0.9.6l\nwhich could cause large recursion and possibly lead to a denial of service\nattack if used where stack space is limited. The Common Vulnerabilities\nand Exposures project (cve.mitre.org) has assigned the name CAN-2003-0851\nto this issue.\n\nThese updated packages contain patches provided by the OpenSSL group that\nprotect against these issues.\n\nNOTE: Because server applications are affected by this issue, users are\nadvised to either restart all services using OpenSSL functionality or\nrestart their system after installing these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:119", "url": "https://access.redhat.com/errata/RHSA-2004:119" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "external", "summary": "117771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117771" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_119.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T16:21:45+00:00", "generator": { "date": "2024-11-05T16:21:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:119", "initial_release_date": "2004-03-17T12:31:00+00:00", "revision_history": [ { "date": "2004-03-17T12:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:21:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0851", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617090" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0851" }, { "category": "external", "summary": "RHBZ#1617090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0851", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0851" } ], "release_date": "2003-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T12:31:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:119" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T12:31:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:119" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.