Action not permitted
Modal body text goes here.
cve-2004-0112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9899", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9899" }, { "name": "SSRT4717", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "name": "RHSA-2004:121", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "MDKSA-2004:023", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "name": "CLA-2004:834", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "57524", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "SuSE-SA:2004:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "name": "NetBSD-SA2004-005", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "name": "O-101", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "name": "TA04-078A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "oval:org.mitre.oval:def:1049", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "name": "openssl-kerberos-ciphersuites-dos(15508)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "name": "VU#484726", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/484726" }, { "name": "GLSA-200403-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "oval:org.mitre.oval:def:9580", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" }, { "name": "11139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "SSA:2004-077", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "name": "2004-0012", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:928", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9899", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9899" }, { "name": "SSRT4717", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "name": "RHSA-2004:121", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "MDKSA-2004:023", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "name": "CLA-2004:834", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "57524", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "SuSE-SA:2004:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "name": "NetBSD-SA2004-005", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "name": "O-101", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "name": "TA04-078A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "oval:org.mitre.oval:def:1049", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "name": "openssl-kerberos-ciphersuites-dos(15508)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "name": "VU#484726", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/484726" }, { "name": "GLSA-200403-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "oval:org.mitre.oval:def:9580", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" }, { "name": "11139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "SSA:2004-077", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "name": "2004-0012", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:928", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9899", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9899" }, { "name": "SSRT4717", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "name": "RHSA-2004:121", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "MDKSA-2004:023", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "name": "CLA-2004:834", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "57524", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "SuSE-SA:2004:007", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "name": "http://lists.apple.com/mhonarc/security-announce/msg00045.html", "refsource": "CONFIRM", "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "name": "http://www.openssl.org/news/secadv_20040317.txt", "refsource": "CONFIRM", "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "name": "NetBSD-SA2004-005", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "name": "O-101", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "name": "TA04-078A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "oval:org.mitre.oval:def:1049", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "name": "openssl-kerberos-ciphersuites-dos(15508)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "name": "VU#484726", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/484726" }, { "name": "GLSA-200403-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "oval:org.mitre.oval:def:9580", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" }, { "name": "11139", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "name": "APPLE-SA-2005-08-15", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "SSA:2004-077", "refsource": "SLACKWARE", "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "name": "2004-0012", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "http://docs.info.apple.com/article.html?artnum=61798", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "name": "APPLE-SA-2005-08-17", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:928", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0112", "datePublished": "2004-03-18T05:00:00", "dateReserved": "2004-02-02T00:00:00", "dateUpdated": "2024-08-08T00:10:03.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0112\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-11-23T05:00:00.000\",\"lastModified\":\"2024-02-15T20:54:12.877\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una denegaci\u00f3n de servicio.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CAFC15-178C-4176-9668-D4A04B63E77B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C8D6949-89F4-40EF-98F4-8D15628DC345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:1.1_\\\\(3.005\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:2.1_\\\\(0.208\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6479D85C-1A12-486D-818C-6679F415CA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"287CF5FA-D0EC-4FD7-9718-973587EF34DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88168D4-7DB5-4720-8640-400BB680D0FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968915A1-375B-4C69-BE11-9A393F7F1B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11465DCA-72E5-40E9-9D8E-B3CD470C47E9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3954D0D1-9FDF-47D0-9710-D0FB06955B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4C5F60-B32D-4D85-BA28-AE11972ED614\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A5935C3-3D83-461F-BC26-E03362115C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AC523B-3106-46F2-B760-803DCF8061F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B8D6F3-D15D-489F-A807-17E63F4831F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808189BA-197F-49CE-933E-A728F395749C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7EF0CD-EA39-457B-8E2E-9120B65A5835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC2983F-5212-464B-AC21-8A897DEC1F58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF17989-D1F2-4B04-80BD-CFABDD482ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2D00AC-FA2A-4C39-B796-DC19072862CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441BE3A0-20F4-4972-B279-19B3DB5FA14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D33C6EF-DBE1-4943-83E4-1F10670DAC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EAEA17-033A-4A50-8E39-D61154876D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE93350-92E6-4F5C-A14C-9993CFFDBCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9F2B04-A1F2-4788-A53D-C8274A758DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5309ED-D84F-4F52-9864-5B0FEEEE5022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C441E-444B-4DF5-8491-86805C70FB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32310AFE-38CC-4C6C-AE13-54C18720F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC46909F-DDFC-448B-BCDF-1EB343F96630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9496279F-AB43-4B53-81A6-87C651ABC4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE2E73-9536-41A9-B83B-0A06B54857F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E562907F-D915-4030-847A-3C6834A80D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138985E6-5107-4E8B-A801-C3D5FE075227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038FEDE7-986F-4CA5-9003-BA68352B87D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E140F76-D078-4F58-89CF-3278CDCB9AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D76A8D-832B-411E-A458-186733C66010\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580BA1FE-0826-47A7-8BD3-9225E0841EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040B04CD-B891-4F19-A7CC-5C2D462FBD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF29685-7FFC-4093-A1D4-21E4871AF5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72872C9-63AF-417F-BFAE-92B4D350C006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BCF196-5E5A-4F31-BCE7-AA0C748CA922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970939C5-1E6F-47B6-97E6-7B2C1E019985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1F4148-E772-4708-8C1F-D67F969C11DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEBCEF0-5982-4B30-8377-9CAC978A1CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09458CD7-D430-4957-8506-FAB2A3E2AA65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B87C95-4B34-4628-AD03-67D1DE13E097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758F95DB-E619-4B08-86FA-6CF2C1B0CBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F04471C-732F-44EE-AD1B-6305C1DD7DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3499913B-5DCD-4115-8C7B-9E8AFF79DE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E237919A-416B-4039-AAD2-7FAE1F4E100D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39149924-188C-40C1-B598-A9CD407C90DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D5780C-4E29-4BCA-A47E-29FF6EAF33FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6501108-5455-48FE-AA82-37AFA5D7EC24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*\",\"matchCriteriaId\":\"C1A3B951-A1F8-4291-82FA-AB7922D13ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2E7C81-C0F5-4D36-9A23-03BE69295ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0EF4A3-2FE5-41E4-A764-30B379ECF081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF6D59E-8AEA-4380-B86B-0803B2202F16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140ABF28-FA39-4D77-AEB2-304962ED48C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09473DD9-5114-44C5-B56C-6630FBEBCACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7ECD3A4-5A39-4222-8350-524F11D8FFB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D36C140D-E80C-479A-ADA7-18E901549059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"940712E9-B041-4B7F-BD02-7DD0AE596D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B887A2-9025-4C5B-8901-71BC63BF5293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33264586-7160-4550-9FF9-4101D72F5C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE5E6521-0611-4473-82AC-21655F10FEC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*\",\"matchCriteriaId\":\"AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*\",\"matchCriteriaId\":\"8C83ABA2-87CD-429B-9800-590F8256B064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D9A576-2878-4AC4-AC95-E69CB8A84A71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A1A0B02-CF33-401F-9AB2-D595E586C795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0EF3F0-B82E-45B7-8D05-05E76009F7A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90FB3825-21A6-4DBE-8188-67672DBE01CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"80623E58-8B46-4559-89A4-C329AACF3CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE6C228-CD93-4636-868B-C19BC1674BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A645148C-AD0D-46C1-BEE3-10F5C9066279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D69187C-7F46-4FF0-A8A0-0E1989EA79BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02029D75-FAF2-4842-9246-079C7DE36417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0146341-364C-4085-A2E1-BC8C260FBA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8496E0D-2507-4C25-A122-0B846CBCA72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E383F2A-DFCF-47F8-94EE-3563D41EA597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D87EF0-056E-4128-89EB-2803ED83DEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB3163C1-2044-44DA-9C88-076D75FDF1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E1B690-C58B-4C08-A757-F3DF451FDAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F0E14C-7681-4D1A-B982-A51E450B93A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF39E8B-C201-4940-81C9-14AF4C3DD4B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC604680-2E9E-4DC4-ACDD-74D552A45BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A94436-D092-4C7E-B87B-63BC621EE82E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"862165CF-3CFB-4C6E-8238-86FA85F243C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056F3336-BAA8-4A03-90B4-7B31710FC1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FDC2510-FBB9-429A-B6D4-10AB11F93960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D45127E-A544-40A0-9D34-BD70D95C9772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C69C3E-C895-45C8-8182-7BB412A0C828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D9564B-B92E-4C97-87FF-B56D62DCA775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2AD44D-3BE8-4541-B62D-9F01D46F8E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF2E08B-9046-41A1-BEDE-EB0B6436315C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"811E1BE8-3868-49F8-B6E8-D5705559B02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67C9DB4-E46C-4E84-82D9-AF48EFDAEFBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF0E1BF0-6629-40DC-AB23-0256BABD0CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC4E7E5-FCC1-46B0-B69F-F1F6B36838ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4AED89-F862-4071-8E94-481A59EDAE8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3CB6FF-3840-4E80-A0A4-614D6686D2B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67010B0B-ECE7-4EE5-B103-05DC637E150F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1355EF99-35FC-44A7-BC56-F7C0EA49BF0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDA8F10-B059-4403-A790-EFC8822588B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06BCD31-3FB6-468B-9BC9-EA573717B19F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360238CC-3BF5-4750-B16D-8A2E0257022E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C55C754-E213-4E79-AA7B-2CAF8A464388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647BA524-5A79-408C-BBF2-5780BC522B64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D599C49D-4D7D-4C44-9D8D-A3F76746BBA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4DC717-0785-4C19-8A33-ACA5F378DF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:forcepoint:stonegate:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858843D3-84BB-48B6-80D1-1271AE60150D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B931D4F8-23F5-4ABA-A457-959995D30C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6A023E-9C2A-487F-B5CE-674C766BFE75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A15ACA2-D500-4260-B51A-6FE6AB5A45A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7B80E0-40BB-4B4E-9711-AF293A038DD4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EFCFFE8-9CAD-4A7F-9751-8627E6297C9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3653856-207E-46A7-92DD-D7F377F1829A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E4627BB-0D75-44BC-989F-0E85C9FA0E2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19053434-F9E7-4839-AB5A-B226CC4616A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D04CABBA-7BEB-44EC-A6E4-A31E41A62BD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D15C938-4DAB-4011-80EE-A2663E20BFC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C056ED-2492-4B1C-BCB9-4F36806C4A48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A72FC232-A2CB-443B-9A4A-8BBFEFE6517C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA347CD3-0619-4EA2-A736-B59EE9E3AC12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ACEF29C-3225-43A7-9E07-FBCCF555887E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D932AF-FB1A-464D-BA3D-2DC2D3C187CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F532860-9E26-45C3-9FB3-6B0888F1279A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A037FAA6-6D26-4496-BC67-03475B4D1155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3831DD3-E783-4200-8986-FDBF7DD9BA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699764B6-0F86-4AB0-86A3-4F2E69AD820C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7562ADC4-0D01-4FC2-98F0-1F4041BDA52E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6FAB588-BDBE-4A04-AB9E-4F700A3951F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B83F84-D1EF-43B4-8620-3C1BCCE44553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41169D2F-4F16-466A-82E9-AD0735472B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"947699C3-D9DE-411A-99C0-44ADD1D2223A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15F668C0-8420-4401-AB0F-479575596CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDCC7B6-34CA-4551-9833-306B93E517BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D69C160-39F7-48B8-B9A3-CC86690453C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"166BF638-ABDC-4BB9-BD4E-2B22681AD9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA6420B-9F6A-48F4-A445-12B60A320347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180D07AE-C571-4DD6-837C-43E2A946007A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90789533-C741-4B1C-A24B-2C77B9E4DE5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1520065B-46D7-48A4-B9D0-5B49F690C5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA526B9-726A-49D5-B3CA-EBE2DA303CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494E48E7-EF86-4860-9A53-94F6C313746E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A518E8-21BE-4C5C-B425-410AB1208E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3AB748-E463-445C-ABAB-4FEDDFD1878B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"660E4B8D-AABA-4520-BC4D-CF8E76E07C05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"85BFEED5-4941-41BB-93D1-CD5C2A41290E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E79A05-64F3-4397-952C-A5BB950C967D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549BB01D-F322-4FE3-BDA2-4FEA8ED8568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"09F3FB7B-0F68-49F3-A3B7-977A687A42E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"088F2FF7-96E5-455E-A35B-D99F9854EC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"FFA721BF-1B2E-479F-BF25-02D441BF175B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*\",\"matchCriteriaId\":\"AFEDCE49-21CC-4168-818F-4C638EE3B077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*\",\"matchCriteriaId\":\"B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26430687-409B-448F-934B-06AB937DDF63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0702A32E-E577-403C-B4D9-15037D7100A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DC217F-C257-4A3C-9CBD-08010C30BEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0F78F4-E81E-4C6B-AB73-D6AAE191060E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1A5808-6D5D-48AD-9470-5A6510D17913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1E8990D-D9A0-4A71-9D87-EC047E01B0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D09E11C-C5BB-409E-BB0D-7F351250419B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B06A05D-AA31-441D-9FC2-3558648C3B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0886901-6F93-44C1-B774-84D7E5D9554C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F203A80-7C1E-4A04-8E99-63525E176753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA0A204C-158B-4014-A53C-75E0CD63E0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"085BA581-7DA5-4FA4-A888-351281FD0A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9519BCB2-B401-44CE-97F6-847BB36AE45F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE573E8-DD94-4293-99AE-27B9067B3ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14413DA-5199-4282-9E22-D347E9D8E469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CC5F49-0E9E-45D8-827D-A5940566DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D94EE19-6CE9-4E02-8174-D9954CDBF02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E4BEE3-AE7B-4481-B724-2E644E18ACC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAAB7052-E0B6-472E-920B-A0F0AEA25D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE38F15-BD42-4171-8670-86AA8169A60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C0BD87-CE4B-49D2-89BE-EF282C43AD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E6C4A8-59F4-43EE-8413-E95289037598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76357A-27E6-4D85-9AA0-1BB658C41568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C5FDB-24E2-479D-87CA-164CD28567D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D982AE39-BB57-49E7-B5FE-5EF1ADE2F019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DE5E22-DF93-46BE-85A3-D4E04379E901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF28C435-C036-4507-8E3F-44E722F9974A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA957E2-ABF9-49B2-874F-3FC3060CE0B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2CDFE7-6853-4A31-85C0-50C57A8D606A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2ED90B-DDBA-49DE-AC78-20E7D77C8858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408A9DB0-81EF-4186-B338-44954E67289B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303362A5-9C3C-4C85-8C97-2AB12CE01BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED22DC1-E06B-4511-B920-6DAB792262D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE44CA7-4BC7-4C2B-948F-2ACABB91528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F757B2A7-869F-4702-81EB-466317A79D61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01F6E9A9-6C85-48DA-BC61-55F8EACCB59F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64AF1E33-4086-43E2-8F54-DA75A99D4B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D16F03-A4C7-4497-AB74-499F208FF059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A33EC1-836B-4C8C-AC18-B5BD4F90E612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BE9C02-2A01-4F6F-A6BD-BC0173561E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C558CED8-8342-46CB-9F52-580B626D320E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F85D19E-6C26-429D-B876-F34238B9DAAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.0\\\\(4.101\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09063867-0E64-4630-B35B-4CCA348E4DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F98CD7-A352-483C-9968-8FB2627A7CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F97FE485-705F-4707-B6C6-0EF9E8A85D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B925E8-D2C2-4E8C-AC21-0C422245C482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9170562-872E-4C32-869C-B10FF35A925E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0927A68-8BB2-4F03-8396-E9CACC158FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"559DDBA3-2AF4-4A0C-B219-6779BA931F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226C9CC-6933-4F10-B426-B47782C606FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757DAE9A-B25D-4B8A-A41B-66C2897B537E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3DC170-E279-4725-B9EE-6840B5685CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.2\\\\(3.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8091EDA9-BD18-47F7-8CEC-E086238647C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F867890-74A4-4892-B99A-27DB4603B873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE05B514-F094-4632-B25B-973F976F6409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3392428D-1A85-4472-A276-C482A78E2CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.102\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40954985-16E6-4F37-B014-6A55166AE093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3\\\\(3.109\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C097809-1FEF-4417-A201-42291CC29122\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=61798\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/mhonarc/security-announce/msg00045.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/11139\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200403-03.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/o-101.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/484726\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:023\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_07_openssl.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openssl.org/news/secadv_20040317.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-120.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-121.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/9899\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.trustix.org/errata/2004/0012\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.uniras.gov.uk/vuls/2004/224012/index.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA04-078A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15508\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]}]}}" } }
rhsa-2004_121
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix several remote denial of service\nvulnerabilities are now available.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a null-pointer assignment in the do_change_cipher_spec() function\nin OpenSSL 0.9.6c-0.9.6l and 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully-crafted SSL/TLS handshake against a server that used\nthe OpenSSL library in such a way as to cause OpenSSL to crash. Depending\non the application this could lead to a denial of service. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0079 to this issue.\n\nStephen Henson discovered a flaw in the SSL/TLS handshaking code when using\nKerberos ciphersuites in OpenSSL 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully-crafted SSL/TLS handshake against a server configured\nto use Kerberos ciphersuites in such a way as to cause OpenSSL to crash. \nMost applications have no ability to use Kerberos ciphersuites and are\ntherefore unaffected by this issue. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0112 to\nthis issue.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue. This issue affects only the OpenSSL\ncompatibility packages shipped with Red Hat Linux 9.\n\nThese updated packages contain patches provided by the OpenSSL group that\nprotect against these issues.\n\nNOTE: Because server applications are affected by this issue, users are\nadvised to either restart all services using OpenSSL functionality or\nrestart their system after installing these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:121", "url": "https://access.redhat.com/errata/RHSA-2004:121" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_121.json" } ], "title": "Red Hat Security Advisory: : Updated OpenSSL packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-05T16:21:53+00:00", "generator": { "date": "2024-11-05T16:21:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:121", "initial_release_date": "2004-03-17T22:23:00+00:00", "revision_history": [ { "date": "2004-03-17T22:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:21:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 9", "product": { "name": "Red Hat Linux 9", "product_id": "Red Hat Linux 9", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:9" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0079", "discovery_date": "2004-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617140" } ], "notes": [ { "category": "description", "text": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0079" }, { "category": "external", "summary": "RHBZ#1617140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0112", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617156" } ], "notes": [ { "category": "description", "text": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0112" }, { "category": "external", "summary": "RHBZ#1617156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617156" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0112", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T22:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:121" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2004_120
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix several remote denial of service\nvulnerabilities are available for Red Hat Enterprise Linux 3.", "title": "Topic" }, { "category": "general", "text": "The OpenSSL toolkit implements Secure Sockets Layer (SSL v2/v3),\nTransport Layer Security (TLS v1) protocols, and serves as a full-strength\ngeneral purpose cryptography library.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a null-pointer assignment in the do_change_cipher_spec() function\nin OpenSSL 0.9.6c-0.9.6k and 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully crafted SSL/TLS handshake against a server that uses\nthe OpenSSL library in such a way as to cause OpenSSL to crash. Depending\non the application this could lead to a denial of service. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0079 to this issue.\n\nStephen Henson discovered a flaw in SSL/TLS handshaking code when using\nKerberos ciphersuites in OpenSSL 0.9.7a-0.9.7c. A remote attacker could\nperform a carefully crafted SSL/TLS handshake against a server configured\nto use Kerberos ciphersuites in such a way as to cause OpenSSL to crash. \nMost applications have no ability to use Kerberos ciphersuites and will\ntherefore be unaffected by this issue. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0112 to\nthis issue.\n\nTesting performed by the OpenSSL group using the Codenomicon TLS Test Tool\nuncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that may\nlead to a denial of service attack (infinite loop). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0081 to this issue. This issue affects only the OpenSSL\ncompatibility packages shipped with Red Hat Enterprise Linux 3.\n\nThese updated packages contain patches provided by the OpenSSL group that\nprotect against these issues.\n\nAdditionally, the version of libica included in the OpenSSL packages has\nbeen updated to 1.3.5. This only affects IBM s390 and IBM eServer zSeries\ncustomers and is required for the latest openCryptoki packages.\n\nNOTE: Because server applications are affected by this issue, users are\nadvised to either restart all services that use OpenSSL functionality or\nrestart their systems after installing these updates.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:120", "url": "https://access.redhat.com/errata/RHSA-2004:120" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.codenomicon.com/testtools/tls/", "url": "http://www.codenomicon.com/testtools/tls/" }, { "category": "external", "summary": "http://www.niscc.gov.uk/", "url": "http://www.niscc.gov.uk/" }, { "category": "external", "summary": "117770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117770" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_120.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T16:21:49+00:00", "generator": { "date": "2024-11-05T16:21:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:120", "initial_release_date": "2004-03-17T13:58:00+00:00", "revision_history": [ { "date": "2004-03-17T13:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-05-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:21:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.i686", "product": { "name": "openssl-0:0.9.7a-33.4.i686", "product_id": "openssl-0:0.9.7a-33.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-0:0.9.7a-33.4.ia64", "product_id": "openssl-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-devel-0:0.9.7a-33.4.ia64", "product_id": "openssl-devel-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.ia64", "product": { "name": "openssl-perl-0:0.9.7a-33.4.ia64", "product_id": "openssl-perl-0:0.9.7a-33.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.ia64", "product": { "name": "openssl096b-0:0.9.6b-16.ia64", "product_id": "openssl096b-0:0.9.6b-16.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-0:0.9.7a-33.4.x86_64", "product_id": "openssl-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64", "product_id": "openssl-devel-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64", "product_id": "openssl-perl-0:0.9.7a-33.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.x86_64", "product": { "name": "openssl096b-0:0.9.6b-16.x86_64", "product_id": "openssl096b-0:0.9.6b-16.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.i386", "product": { "name": "openssl-0:0.9.7a-33.4.i386", "product_id": "openssl-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.i386", "product": { "name": "openssl-devel-0:0.9.7a-33.4.i386", "product_id": "openssl-devel-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.i386", "product": { "name": "openssl-perl-0:0.9.7a-33.4.i386", "product_id": "openssl-perl-0:0.9.7a-33.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.i386", "product": { "name": "openssl096b-0:0.9.6b-16.i386", "product_id": "openssl096b-0:0.9.6b-16.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.src", "product": { "name": "openssl-0:0.9.7a-33.4.src", "product_id": "openssl-0:0.9.7a-33.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=src" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.src", "product": { "name": "openssl096b-0:0.9.6b-16.src", "product_id": "openssl096b-0:0.9.6b-16.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ppc64", "product": { "name": "openssl-0:0.9.7a-33.4.ppc64", "product_id": "openssl-0:0.9.7a-33.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-0:0.9.7a-33.4.ppc", "product_id": "openssl-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-devel-0:0.9.7a-33.4.ppc", "product_id": "openssl-devel-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.ppc", "product": { "name": "openssl-perl-0:0.9.7a-33.4.ppc", "product_id": "openssl-perl-0:0.9.7a-33.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.ppc", "product": { "name": "openssl096b-0:0.9.6b-16.ppc", "product_id": "openssl096b-0:0.9.6b-16.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-0:0.9.7a-33.4.s390x", "product_id": "openssl-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-devel-0:0.9.7a-33.4.s390x", "product_id": "openssl-devel-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.s390x", "product": { "name": "openssl-perl-0:0.9.7a-33.4.s390x", "product_id": "openssl-perl-0:0.9.7a-33.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product_id": "openssl-debuginfo-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.4.s390", "product": { "name": "openssl-0:0.9.7a-33.4.s390", "product_id": "openssl-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.4.s390", "product": { "name": "openssl-devel-0:0.9.7a-33.4.s390", "product_id": "openssl-devel-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.4.s390", "product": { "name": "openssl-perl-0:0.9.7a-33.4.s390", "product_id": "openssl-perl-0:0.9.7a-33.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.4?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.s390", "product": { "name": "openssl096b-0:0.9.6b-16.s390", "product_id": "openssl096b-0:0.9.6b-16.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.src" }, "product_reference": "openssl-0:0.9.7a-33.4.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.src" }, "product_reference": "openssl096b-0:0.9.6b-16.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0079", "discovery_date": "2004-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617140" } ], "notes": [ { "category": "description", "text": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0079" }, { "category": "external", "summary": "RHBZ#1617140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0079" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0081", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617142" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0081" }, { "category": "external", "summary": "RHBZ#1617142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0081" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0112", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617156" } ], "notes": [ { "category": "description", "text": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0112" }, { "category": "external", "summary": "RHBZ#1617156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617156" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0112", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112" } ], "release_date": "2004-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-03-17T13:58:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:openssl-0:0.9.7a-33.4.i386", "3AS:openssl-0:0.9.7a-33.4.i686", "3AS:openssl-0:0.9.7a-33.4.ia64", "3AS:openssl-0:0.9.7a-33.4.ppc", "3AS:openssl-0:0.9.7a-33.4.ppc64", "3AS:openssl-0:0.9.7a-33.4.s390", "3AS:openssl-0:0.9.7a-33.4.s390x", "3AS:openssl-0:0.9.7a-33.4.src", "3AS:openssl-0:0.9.7a-33.4.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3AS:openssl-devel-0:0.9.7a-33.4.i386", "3AS:openssl-devel-0:0.9.7a-33.4.ia64", "3AS:openssl-devel-0:0.9.7a-33.4.ppc", "3AS:openssl-devel-0:0.9.7a-33.4.s390", "3AS:openssl-devel-0:0.9.7a-33.4.s390x", "3AS:openssl-devel-0:0.9.7a-33.4.x86_64", "3AS:openssl-perl-0:0.9.7a-33.4.i386", "3AS:openssl-perl-0:0.9.7a-33.4.ia64", "3AS:openssl-perl-0:0.9.7a-33.4.ppc", "3AS:openssl-perl-0:0.9.7a-33.4.s390", "3AS:openssl-perl-0:0.9.7a-33.4.s390x", "3AS:openssl-perl-0:0.9.7a-33.4.x86_64", "3AS:openssl096b-0:0.9.6b-16.i386", "3AS:openssl096b-0:0.9.6b-16.ia64", "3AS:openssl096b-0:0.9.6b-16.ppc", "3AS:openssl096b-0:0.9.6b-16.s390", "3AS:openssl096b-0:0.9.6b-16.src", "3AS:openssl096b-0:0.9.6b-16.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3Desktop:openssl-0:0.9.7a-33.4.i386", "3Desktop:openssl-0:0.9.7a-33.4.i686", "3Desktop:openssl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-0:0.9.7a-33.4.s390", "3Desktop:openssl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-0:0.9.7a-33.4.src", "3Desktop:openssl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.4.i386", "3Desktop:openssl-devel-0:0.9.7a-33.4.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.4.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390", "3Desktop:openssl-devel-0:0.9.7a-33.4.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.4.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.4.i386", "3Desktop:openssl-perl-0:0.9.7a-33.4.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.4.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390", "3Desktop:openssl-perl-0:0.9.7a-33.4.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.4.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.i386", "3Desktop:openssl096b-0:0.9.6b-16.ia64", "3Desktop:openssl096b-0:0.9.6b-16.ppc", "3Desktop:openssl096b-0:0.9.6b-16.s390", "3Desktop:openssl096b-0:0.9.6b-16.src", "3Desktop:openssl096b-0:0.9.6b-16.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3ES:openssl-0:0.9.7a-33.4.i386", "3ES:openssl-0:0.9.7a-33.4.i686", "3ES:openssl-0:0.9.7a-33.4.ia64", "3ES:openssl-0:0.9.7a-33.4.ppc", "3ES:openssl-0:0.9.7a-33.4.ppc64", "3ES:openssl-0:0.9.7a-33.4.s390", "3ES:openssl-0:0.9.7a-33.4.s390x", "3ES:openssl-0:0.9.7a-33.4.src", "3ES:openssl-0:0.9.7a-33.4.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.4.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3ES:openssl-devel-0:0.9.7a-33.4.i386", "3ES:openssl-devel-0:0.9.7a-33.4.ia64", "3ES:openssl-devel-0:0.9.7a-33.4.ppc", "3ES:openssl-devel-0:0.9.7a-33.4.s390", "3ES:openssl-devel-0:0.9.7a-33.4.s390x", "3ES:openssl-devel-0:0.9.7a-33.4.x86_64", "3ES:openssl-perl-0:0.9.7a-33.4.i386", "3ES:openssl-perl-0:0.9.7a-33.4.ia64", "3ES:openssl-perl-0:0.9.7a-33.4.ppc", "3ES:openssl-perl-0:0.9.7a-33.4.s390", "3ES:openssl-perl-0:0.9.7a-33.4.s390x", "3ES:openssl-perl-0:0.9.7a-33.4.x86_64", "3ES:openssl096b-0:0.9.6b-16.i386", "3ES:openssl096b-0:0.9.6b-16.ia64", "3ES:openssl096b-0:0.9.6b-16.ppc", "3ES:openssl096b-0:0.9.6b-16.s390", "3ES:openssl096b-0:0.9.6b-16.src", "3ES:openssl096b-0:0.9.6b-16.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.x86_64", "3WS:openssl-0:0.9.7a-33.4.i386", "3WS:openssl-0:0.9.7a-33.4.i686", "3WS:openssl-0:0.9.7a-33.4.ia64", "3WS:openssl-0:0.9.7a-33.4.ppc", "3WS:openssl-0:0.9.7a-33.4.ppc64", "3WS:openssl-0:0.9.7a-33.4.s390", "3WS:openssl-0:0.9.7a-33.4.s390x", "3WS:openssl-0:0.9.7a-33.4.src", "3WS:openssl-0:0.9.7a-33.4.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.4.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.4.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.4.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.4.x86_64", "3WS:openssl-devel-0:0.9.7a-33.4.i386", "3WS:openssl-devel-0:0.9.7a-33.4.ia64", "3WS:openssl-devel-0:0.9.7a-33.4.ppc", "3WS:openssl-devel-0:0.9.7a-33.4.s390", "3WS:openssl-devel-0:0.9.7a-33.4.s390x", "3WS:openssl-devel-0:0.9.7a-33.4.x86_64", "3WS:openssl-perl-0:0.9.7a-33.4.i386", "3WS:openssl-perl-0:0.9.7a-33.4.ia64", "3WS:openssl-perl-0:0.9.7a-33.4.ppc", "3WS:openssl-perl-0:0.9.7a-33.4.s390", "3WS:openssl-perl-0:0.9.7a-33.4.s390x", "3WS:openssl-perl-0:0.9.7a-33.4.x86_64", "3WS:openssl096b-0:0.9.6b-16.i386", "3WS:openssl096b-0:0.9.6b-16.ia64", "3WS:openssl096b-0:0.9.6b-16.ppc", "3WS:openssl096b-0:0.9.6b-16.s390", "3WS:openssl096b-0:0.9.6b-16.src", "3WS:openssl096b-0:0.9.6b-16.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:120" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
ghsa-ph6p-3j2f-xq2g
Vulnerability from github
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
{ "affected": [], "aliases": [ "CVE-2004-0112" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-11-23T05:00:00Z", "severity": "MODERATE" }, "details": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "id": "GHSA-ph6p-3j2f-xq2g", "modified": "2022-05-03T03:12:55Z", "published": "2022-05-03T03:12:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0112" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "type": "WEB", "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/11139" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "type": "WEB", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/484726" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "type": "WEB", "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/9899" }, { "type": "WEB", "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2004/0012" }, { "type": "WEB", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" } ], "schema_version": "1.4.0", "severity": [] }
var-200411-0171
Vulnerability from variot
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. OpenSSL for, Kerberos using a cipher suite SSL/TLS When communicating, there is a flaw in not properly checking the communication data during the key exchange during handshake, and it is intentionally created. Please note that this vulnerability OpenSSL Applications and systems using the library may also be affected. For more detailed information about other systems, NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please also check.OpenSSL Applications that use this crash and cause a denial of service. (DoS) may become a state. OpenSSL is an open source SSL implementation used to implement high-strength encryption of network communications. It is now widely used in various network applications.
When using Kerberos ciphersuites, there is a flaw in the SSL / TLS handshake code. A remote attacker can construct a special SSL / TLS handshake and send it to a server configured with Kerberos ciphersuites. Most applications do not use Kerberos ciphersuites. It is therefore not affected by this vulnerability. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. Multiple security vulnerabilities are reported to affect Apple Mac OS X; updates are available. Apache is prone to five vulnerabilities ranging from buffer overflows to access validation vulnerabilities. The CVE Mitre candidate IDs CAN-2005-1344, CAN-2004-0942, CAN-2004-0885, CAN-2004-1083, and CAN-2004-1084 are assigned to these issues. Appkit is prone to three vulnerabilities. Two of these could result in arbitrary code execution, the third could permit the creation of local accounts. The CVE Mitre candidate IDs CAN-2005-2501, CAN-2005-2502, and CAN-2005-2503 are assigned to these issues. Bluetooth is prone to a vulnerability regarding authentication bypass. The CVE Mitre candidate ID CAN-2005-2504 is assigned to this issue. CoreFoundation is prone to two vulnerabilities, one resulting in a buffer overflow, the other a denial-of-service vulnerability. The CVE Mitre candidate IDs CAN-2005-2505 and CAN-2005-2506 are assigned to these issues. CUPS is prone to two vulnerabilities resulting in a denial of service until the service can be restarted. The CVE Mitre candidate IDs CAN-2005-2525 and CAN-2005-2526 are assigned to these issues. Directory Services is prone to three vulnerabilities. These issues vary from buffer overflow, unauthorized account creation and deletion, and privilege escalation. The CVE Mitre candidate IDs CAN-2005-2507, CAN-2005-2508 and CAN-2005-2519 are assigned to these issues. HItoolbox is prone to a vulnerability that could result in information disclosure. The CVE Mitre candidate ID CAN-2005-2513 is assigned to this issue. Kerberos is prone to five vulnerabilities that may result in a buffer overflow, execution of arbitrary code, and root compromise. The CVE Mitre candidate IDs CAN-2004-1189, CAN-2005-1174, CAN-2005-1175, CAN-2005-1689, and CAN-2005-2511 are assigned to these issues. loginwindow is prone to a vulnerability that could permit a user to gain access to other logged-in accounts. The CVE Mitre candidate ID CAN-2005-2509 is assigned to this issue. Mail is prone to a vulnerability regarding the loss of privacy when remote images are loaded into HTML email. The CVE Mitre candidate ID CAN-2005-2512 is assigned to this issue. MySQL is prone to three vulnerabilities that include arbitrary code execution by remote authenticated users. The CVE Mitre candidate IDs CAN-2005-0709, CAN-2005-0710, and CAN-2005-0711 are assigned to these issues. OpenSSL is prone to two vulnerabilities resulting in denial of service. The CVE Mitre candidate IDs CAN-2004-0079 and CAN-2004-0112 are assigned to these issues. ping is prone to a vulnerability that could allow local privilege escalation and arbitrary code execution. The CVE Mitre candidate ID CAN-2005-2514 is assigned to this issue. QuartzComposerScreenSaver is prone to a vulnerability that could allow users to open pages while the RSS Visualizer screen is locked. The CVE Mitre candidate ID CAN-2005-2515 is assigned to this issue. Safari is prone to two vulnerabilities that could result in arbitrary command execution or have information submitted to an incorrect site. The CVE Mitre candidate IDs CAN-2005-2516 and CAN-2005-2517 are assigned to these issues. SecurityInterface is prone to a vulnerability that could expose recently used passwords. The CVE Mitre candidate ID CAN-2005-2520 is assigned to this issue. servermgrd is prone to a buffer-overflow vulnerability that could ultimately lead to the execution of arbitrary code. The CVE Mitre candidate ID CAN-2005-2518 is assigned to this issue. servermgr_ipfilter is prone to a vulnerability regarding firewall settings not always being written to the Active Rules. The CVE Mitre candidate ID CAN-2005-2510 is assigned to this issue. SquirrelMail is prone to two vulnerabilities including a cross-site scripting issue. The CVE Mitre candidate IDs CAN-2005-1769 and CAN-2005-2095 are assigned to these issues. traceroute is prone to a vulnerability that could result in arbitrary code execution and privilege escalation. The CVE Mitre candidate ID CAN-2005-2521 is assigned to this issue. WebKit is affected by a vulnerability that could result in code execution regarding a malformed PDF file. The CVE Mitre candidate ID CAN-2005-2522 is assigned to this issue. Weblog Server is prone to multiple cross-site scripting vulnerabilities. The CVE Mitre candidate ID CAN-2005-2523 is assigned to this issue. X11 is prone to a vulnerability that could result in arbitrary code execution. The CVE Mitre candidate ID CAN-2005-0605 is assigned to this issue. zlib is prone to two denial-of-service vulnerabilities that may ultimately lead to arbitrary code execution. The CVE Mitre candidate IDs CAN-2005-2096 and CAN-2005-1849 are assigned to these issues. These vulnerabilities will be separated into individual BIDs upon further analysis of the issues. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc.
TITLE: Fedora update for openssl096b
SECUNIA ADVISORY ID: SA17381
VERIFY ADVISORY: http://secunia.com/advisories/17381/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/
DESCRIPTION: Fedora has issued an update for openssl096b.
For more information: SA10133 SA11139
SOLUTION: Apply updated packages.
Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
8d68e4b430aa7c5ca067c12866ae694e SRPMS/openssl096b-0.9.6b-21.42.src.rpm 54a9e78a2fdd625b9dc9121e09eb4398 x86_64/openssl096b-0.9.6b-21.42.x86_64.rpm c5c6174e23eba8d038889d08f49231b8 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm 56b63fc150d0c099b2e4f0950e21005b x86_64/openssl096b-0.9.6b-21.42.i386.rpm 56b63fc150d0c099b2e4f0950e21005b i386/openssl096b-0.9.6b-21.42.i386.rpm 93195495585c7e9789041c75b1ed5380 i386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm
OTHER REFERENCES: SA10133: http://secunia.com/advisories/10133/
SA11139: http://secunia.com/advisories/11139/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: Cisco OpenSSL Implementation Vulnerability
Revision 1.0
For Public Release 2004 March 17 at 1300 UTC (GMT)
----------------------------------------------------------------------
Contents
Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: INTERIM
Distribution
Revision History
Cisco Security Procedures
----------------------------------------------------------------------
Summary
A new vulnerability in the OpenSSL implementation for SSL has been announced on March 17, 2004.
An affected network device running an SSL server based on an affected OpenSSL implementation may be vulnerable to a Denial of Service (DoS) attack. There are workarounds available to mitigate the effects of this vulnerability on Cisco products in the workaround section of this advisory. Cisco is providing fixed software, and recommends that customers upgrade to it when it is available.
This advisory will be posted at http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml.
* Cisco IOS 12.1(11)E and later in the 12.1E release train. Only crypto
images (56i and k2) are vulnerable for the Cisco 7100 and 7200 Series
Routers.
* Cisco IOS 12.2SY release train. Only crypto images (k8, k9 and k91)
are vulnerable for the Cisco Catalyst 6500 Series and Cisco 7600
Series Routers.
* Cisco PIX Firewall
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers
* Cisco MDS 9000 Series Multilayer Switch
* Cisco Content Service Switch (CSS) 11000 series
* Cisco Global Site Selector (GSS) 4480
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1
* Cisco Access Registrar (CAR)
The following products have their SSL implementation based on the OpenSSL code and are not affected by this vulnerability.
* Cisco Secure Intrusion Detection System (NetRanger) appliance. This
includes the IDS-42xx appliances, NM-CIDS and WS-SVS-IDSM2.
* Cisco SN 5428 and SN 5428-2 Storage Router
* Cisco CNS Configuration Engine
* Cisco Network Analysis Modules (NAM) for the Cisco Catalyst 6000 and
6500 Series switches and Cisco 7600 Series routers
* Cisco SIP Proxy Server (SPS)
* CiscoWorks 1105 Hosting Solution Engine (HSE)
* CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)
* Cisco Ethernet Subscriber Solution Engine (ESSE)
The following products, which implement SSL, are not affected by this vulnerability.
* Cisco VPN 3000 Series Concentrators
CatOS does not implement SSL and is not vulnerable. This vulnerability is still being actively investigated across Cisco products and status of some products has still not been determined.
Details
Secure Sockets Layer (SSL), is a protocol used to encrypt the data transferred over an TCP session. SSL in Cisco products is mainly used by the HyperText Transfer Protocol Secure (HTTPS) web service for which the default TCP port is 443. The affected products, listed above, are only vulnerable if they have the HTTPS service enabled and the access to the service is not limited to trusted hosts or network management workstations.
To check if the HTTPS service is enabled one can do the following:
1. Check the configuration on the device to verify the status of the
HTTPS service.
2. Try to connect to the device using a standard web browser that
supports SSL using a URL similar to https://ip_address_of_device/.
3. Try and connect to the default HTTPS port, TCP 443, using Telnet.
telnet ip_address_of_device 443. If the session connects the service
is enabled and accessible.
Testing by the OpenSSL development team has uncovered a null-pointer assignment in the do_change_cipher_spec() function. This crash on many Cisco products would cause the device to reload.
A third vulnerability described in the NISCC advisory is a bug in older versions of OpenSSL, versions before 0.9.6d, that can also lead to a Denial of Service attack. None of the Cisco OpenSSL implementations are known to be affected by this older OpenSSL issue.
* Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2)
image releases in the 12.1E release train for the Cisco 7100 and 7200
Series Routers are affected by this vulnerability. All IOS software
crypto (k8, k9, and k91) image releases in the 12.2SY release train
for the Cisco Catalyst 6500 Series and Cisco 7600 Series Routers are
affected by this vulnerability. The SSH implementation in IOS is not
dependent on any OpenSSL code. SSH implementations in IOS do not
handle certificates, yet, and therefore do not use any SSL code for
SSH. OpenSSL in 12.1E and 12.2SY release trains is only used for
providing the HTTPS and VPN Device Manager (VDM) services. This
vulnerability is documented in the Cisco Bug Toolkit (registered
customers only) as Bug ID CSCee00041. The HTTPS web service, that uses
the OpenSSL code, on the device is disabled by default. The no ip http
secure-server command may be used to disable the HTTPS web service on
the device, if required. The SSH and IPSec services in IOS are not
vulnerable to this vulnerability.
* Cisco PIX Firewall - PIX 6.x releases are affected by this
vulnerability. PIX 5.x releases do not contain any SSL code and are
not vulnerable. This vulnerability is documented in the Cisco Bug
Toolkit (registered customers only) as Bug ID CSCed90672.
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee02055.
* Cisco MDS 9000 Series Multilayer Switches - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCed96246.
* Cisco Content Service Switch (CSS) 11000 series - WebNS version 6.x
and 7.x are affected by this vulnerability. This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee01234 for SCM and is documented in the Cisco Bug Toolkit
(registered customers only) as Bug ID CSCee01240 for the SSL module.
* Cisco Global Site Selector (GSS) 4480 - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee01057.
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1 - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCsa13748.
* Cisco Access Registrar (CAR) - This vulnerability is documented in the
Cisco Bug Toolkit (registered customers only) as Bug ID CSCee01956.
The Internetworking Terms and Cisco Systems Acronyms online guides can be found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/.
Impact
An affected network device running an SSL server based on the OpenSSL implementation may be vulnerable to a Denial of Service (DoS) attack.
Software Versions and Fixes
* Cisco IOS -
+----------------------------------------+
|Release| Fixed Releases |Availability |
| Train | | |
|-------+------------------+-------------|
|12.2SY |12.2(14)SY4 |March 25 |
|-------+------------------+-------------|
| |12.1(13)E14 |April 8 |
|12.1E |12.1.(19)E7 |April 8 |
| |12.1(20)E3 |April 26 |
+----------------------------------------+
* Cisco PIX Firewall - The vulnerability is fixed in software releases
6.0(4)102, 6.1(5)102, 6.2(3)107, and 6.3(3)124. These engineering
builds may be obtained by contacting the Cisco Technical Assistance
Center (TAC). TAC Contact information is given in the Obtaining Fixed
Software section below.
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers - The vulnerability is fixed in
software release 1.1.3(14) which will be available by Monday, 22 of
March, 2004. This engineering builds may be obtained by contacting the
Cisco Technical Assistance Center (TAC). TAC Contact information is
given in the Obtaining Fixed Software section below.
* Cisco MDS 9000 Series Multilayer Switches - No fixed software release
or software availability date has been determined yet.
* Cisco Content Service Switch (CSS) 11000 series -No fixed software
release or software availability date has been determined yet.
* Cisco Global Site Selector (GSS) 4480 - No fixed software release or
software availability date has been determined yet.
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1 - No fixed software release or
software availability date has been determined yet.
* Cisco Access Registrar (CAR) - The vulnerability is fixed in software
release 3.5.0.12 which will be available by Friday, 26 of March, 2004.
Obtaining Fixed Software
Cisco is offering free software upgrades to address this vulnerability for all affected customers.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, Customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set forth at the Cisco Connection Online Software Center at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/tacpage/sw-center. To access the software download URL, you must be a registered user and you must be logged in.
Customers whose Cisco products are provided or maintained through a prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers, should contact that support organization for assistance with obtaining the software upgrade(s).
Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their upgrades by contacting the Cisco Technical Assistance Center (TAC) using the contact information listed below. In these cases, customers are entitled to obtain a free upgrade to a later version of the same release or as indicated by the applicable corrected software version in the Software Versions and Fixes section (noted above).
Cisco TAC contacts are as follows:
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including special localized telephone numbers and instructions and e-mail addresses for use in various languages.
Please have your product serial number available and give the URL of this notice as evidence of your entitlement to a upgrade. Upgrades for non-contract customers must be requested through the TAC.
Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades.
Workarounds
The Cisco PSIRT recommends that affected users upgrade to a fixed software version of code as soon as it is available.
* Restrict access to the HTTPS server on the network device. Allow
access to the network device only from trusted workstations by using
access lists / MAC filters that are available on the affected
platforms.
* Disable the SSL server / service on the network device. This
workaround must be weighed against the need for secure communications
with the vulnerable device.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any malicious use of the vulnerability described in this advisory.
Status of This Notice: INTERIM
This is an interim advisory. Although Cisco cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Cisco does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Cisco may update this advisory.
A stand-alone copy or paraphrase of the text of this security advisory that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory will be posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml .
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key having the fingerprint 8C82 5207 0CA9 ED40 1DD2 EE2A 7B31 A8CF 32B6 B590 and is posted to the following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-teams@first.org (includes CERT/CC)
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.netsys.com
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+------------------------------------------+ |Revision 1.0|2004-March-17|Initial | | | |release. | +------------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
This advisory is copyright 2004 by Cisco Systems, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information.
----------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Comment: PGP Signed by Sharad Ahlawat, Cisco Systems PSIRT
iD8DBQFAWFvZezGozzK2tZARAqIwAKDXDMLAY6eDYyU8y1MhKZUto2SRxwCg+oid 7AhsNlLsNVSLwTRKTHSigu0= =gtba -----END PGP SIGNATURE----- .
OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html):
ftp://ftp.openssl.org/source/
The distribution file names are:
o openssl-0.9.7d.tar.gz
MD5 checksum: 1b49e90fc8a75c3a507c0a624529aca5
o openssl-0.9.6m.tar.gz [normal]
MD5 checksum: 1b63bfdca1c37837dddde9f1623498f9
o openssl-engine-0.9.6m.tar.gz [engine]
MD5 checksum: 4c39d2524bd466180f9077f8efddac8c
The checksums were calculated using the following command:
openssl md5 openssl-0.9*.tar.gz
Credits
Patches for these issues were created by Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team. The OpenSSL team would like to thank Codenomicon for supplying the TLS Test Tool which was used to discover these vulnerabilities, and Joe Orton of Red Hat for performing the majority of the testing.
References
http://www.codenomicon.com/testtools/tls/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
URL for this Security Advisory: http://www.openssl.org/news/secadv_20040317.txt
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0171", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "freebsd", "scope": "eq", "trust": 1.9, "vendor": "freebsd", "version": "4.9" }, { "model": "freebsd", "scope": "eq", "trust": 1.9, "vendor": "freebsd", "version": "4.8" }, { "model": "gsx server", "scope": "eq", "trust": 1.3, "vendor": "vmware", "version": "2.5.1" }, { "model": "gsx server", "scope": "eq", "trust": 1.3, "vendor": "vmware", "version": "2.0" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat webcluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat securitycluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "servercluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5.2" }, { "model": "servercluster", "scope": "eq", "trust": 1.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "propack", "scope": "eq", "trust": 1.3, "vendor": "sgi", "version": "3.0" }, { "model": "propack", "scope": "eq", "trust": 1.3, "vendor": "sgi", "version": "2.4" }, { "model": "propack", "scope": "eq", "trust": 1.3, "vendor": "sgi", "version": "2.3" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.4" }, { "model": "openbsd", "scope": "eq", "trust": 1.3, "vendor": "openbsd", "version": "3.3" }, { "model": "imanager", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "2.0" }, { "model": "imanager", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "1.5" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.7" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.6.2" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.5.27" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.5" }, { "model": "edirectory", "scope": "eq", "trust": 1.3, "vendor": "novell", "version": "8.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.11" }, { "model": "apache-based web server", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "2.0.43.04" }, { "model": "apache-based web server", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "2.0.43.00" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.2" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.1" }, { "model": "webns", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "7.10" }, { "model": "webns", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "6.10" }, { "model": "secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "10000" }, { "model": "okena stormwatch", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "3.2" }, { "model": "firewall services module", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.1.3" }, { "model": "firewall services module", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.1.2" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.0" }, { "model": "css secure content accelerator", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "1.0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.2" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "2.1" }, { "model": "sg5", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.4" }, { "model": "sg5", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.3" }, { "model": "sg5", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.2" }, { "model": "sg208", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.4" }, { "model": "sg203", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.31.29" }, { "model": "sg203", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.4" }, { "model": "sg200", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.31.29" }, { "model": "sg200", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "4.4" }, { "model": "converged communications server", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.3.1" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.3" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.4" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.3" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.2" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2.1" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "5.2" }, { "model": "webstar", "scope": "eq", "trust": 1.3, "vendor": "4d", "version": "4.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "cacheos ca sa", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "4.1.10" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00.00" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp0" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.40" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5.1.46" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2000_r2.0.1" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.1" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "pix firewall", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2.2_.111" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(14\\)sy1" }, { "model": "aaa server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "application and content networking software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(3.109\\)" }, { "model": "clientless vpn gateway 4400", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "5.0" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.7a-2" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.2.1" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(1\\)" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.20" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "10000_r2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.5.18" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3.100\\)" }, { "model": "threat response", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp1" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "s3400" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(3\\)" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e12" }, { "model": "call manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.2.4" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.00" }, { "model": "enterprise", "scope": "eq", "trust": 1.0, "vendor": "tarantella", "version": "3.30" }, { "model": "sg208", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "openserver", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": "5.0.7" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(1\\)" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp0" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5000_r2.0.1" }, { "model": "edirectory", "scope": "eq", "trust": 1.0, "vendor": "novell", "version": "8.5.12a" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "*" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp2" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "litespeed web server", "scope": "eq", "trust": 1.0, "vendor": "litespeedtech", "version": "1.0.1" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "vsx_ng_with_application_intelligence" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.02.00.01" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(19\\)e1" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "firewall-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "2.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(2\\)" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.0" }, { "model": "gss 4490 global site selector", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(13\\)e9" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.7" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2" }, { "model": "wbem", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.05.08" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "2.5.1_build_5336" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "provider-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "4.1" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.1.02" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.10_b4" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "1_3.0" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.7.1" }, { "model": "mds 9000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "2.0" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.0.1" }, { "model": "crypto accelerator 4000", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.8" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1_\\(3.005\\)" }, { "model": "css11000 content services switch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2_0.0.03" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sy" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "8.05" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "s3210" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.6-15" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(1\\)" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.04" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.0" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2za" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "0.9.6b-3" }, { "model": "access registrar", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.6" }, { "model": "content services switch 11500", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4\\)" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "3.0" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(4\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.3\\(3.102\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(4.101\\)" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.02" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.9" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1_0.1.02" }, { "model": "cacheos ca sa", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "4.1.12" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "vpn-1", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "next_generation_fp1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11b\\)e14" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1_0.2.06" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "7500_r2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "5.2.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(14\\)sy" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.0.7" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(3\\)" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.01" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.2" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "3.0_build_7592" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(3\\)" }, { "model": "gsx server", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "2.0.1_build_2129" }, { "model": "firewall services module", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.1_\\(0.208\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(5\\)" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "5x" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.6.2" }, { "model": "gss 4480 global site selector", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "bsafe ssl-j", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": "3.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.1\\(11\\)e" }, { "model": "webns", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.10_.0.06s" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "2.5" }, { "model": "proxysg", "scope": "eq", "trust": 1.0, "vendor": "bluecoat", "version": "*" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(1\\)" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "2.1" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "500" }, { "model": "sidewinder", "scope": "eq", "trust": 1.0, "vendor": "securecomputing", "version": "5.2.0.03" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.5.17" }, { "model": "vsu", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "100_r2.0.1" }, { "model": "stonebeat fullcluster", "scope": "eq", "trust": 1.0, "vendor": "stonesoft", "version": "1_2.0" }, { "model": "stonegate", "scope": "eq", "trust": 1.0, "vendor": "forcepoint", "version": "1.7.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.3" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openssl", "version": null }, { "model": "netwatcher", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "turbolinux appliance server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "red hat enterprise linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "hp-ux apache-based web server", "scope": null, "trust": 0.8, "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9", "version": null }, { "model": "hp-ux", "scope": null, "trust": 0.8, "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9", "version": null }, { "model": "trendmicro interscan viruswall", "scope": null, "trust": 0.8, "vendor": "\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed", "version": null }, { "model": "provider-1", "scope": null, "trust": 0.8, "vendor": "\u30c1\u30a7\u30c3\u30af \u30dd\u30a4\u30f3\u30c8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba", "version": null }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": "7115" }, { "model": "hp wbem services", "scope": null, "trust": 0.8, "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9", "version": null }, { "model": "turbolinux server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "red hat enterprise linux desktop", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "netshelter\u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "sun cobalt raq4", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": "7117" }, { "model": "netbsd", "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": "vine linux", "scope": null, "trust": 0.8, "vendor": "vine linux", "version": null }, { "model": "asianux server", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "red hat linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "sun crypto accelerator", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "turbolinux desktop", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "ipcom\u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "firewall-1 gx", "scope": null, "trust": 0.8, "vendor": "\u30c1\u30a7\u30c3\u30af \u30dd\u30a4\u30f3\u30c8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba", "version": null }, { "model": "openssl", "scope": null, "trust": 0.8, "vendor": "openssl", "version": null }, { "model": "hp-ux aaa server", "scope": null, "trust": 0.8, "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9", "version": null }, { "model": "vpn-1/firewall-1", "scope": null, "trust": 0.8, "vendor": "\u30c1\u30a7\u30c3\u30af \u30dd\u30a4\u30f3\u30c8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba", "version": null }, { "model": "turbolinux workstation", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "primergy sslaccelerator", "scope": "eq", "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": "7110" }, { "model": null, "scope": null, "trust": 0.6, "vendor": "none", "version": null }, { "model": "ios 12.1 e", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.3.9" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.07592" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.15336" }, { "model": "gsx server build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.12129" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.40" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.30" }, { "model": "enterprise", "scope": "eq", "trust": 0.3, "vendor": "tarantella", "version": "33.200" }, { "model": "clientless vpn gateway series", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "44005.0" }, { "model": "crypto accelerator", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "40001.0" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate vpn client", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.5" }, { "model": "stonebeat fullcluster for raptor", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for isa server", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for gauntlet", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "3.0" }, { "model": "stonebeat fullcluster for firewall-1", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.24" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.23" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.1.02" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.1" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.04" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.03" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.02" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2.0.01" }, { "model": "computing sidewinder", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "5.2" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.3" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.1" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.1" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.0.1" }, { "model": "security bsafe ssl-j sdk", "scope": "eq", "trust": 0.3, "vendor": "rsa", "version": "3.0" }, { "model": "openssl096b-0.9.6b-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl096-0.9.6-15.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-perl-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-devel-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssl-0.9.7a-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "hat fedora core3", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat fedora core2", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat fedora core1", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "edirectory su1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.7.1" }, { "model": "edirectory a", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "8.5.12" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3.1" }, { "model": "litespeed web server rc3", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server rc2", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server rc1", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2.1" }, { "model": "litespeed web server rc2", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2" }, { "model": "litespeed web server rc1", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.1.1" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.1" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.3" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.2" }, { "model": "litespeed web server", "scope": "eq", "trust": 0.3, "vendor": "lite speed", "version": "1.0.1" }, { "model": "wbem a.02.00.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem a.02.00.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "wbem a.01.05.08", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.5" }, { "model": "aaa server", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "associates etrust security command center", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.13" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.12" }, { "model": "secure gateway for solaris", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "1.1" }, { "model": "webns .0.06s", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.20.0.03" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.2.06" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.1.02" }, { "model": "webns b4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.10" }, { "model": "threat response", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.109)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.102)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.5" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(5)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.4" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4.101)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(4)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(2)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "ios 12.2za", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sy1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e14", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e12", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ec", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ea1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1(0.208)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1(3.005)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "css11500 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "call manager", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "point software vpn-1 vsx ng with application intelligence", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software providor-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software providor-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 vsx ng with application intelligence", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 gx", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "2.0" }, { "model": "coat systems proxysg", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.12" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7500" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5x0" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5000" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5000" }, { "model": "vsu", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "50" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2000" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "10000" }, { "model": "vsu r2.0.1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "100" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.4" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.3" }, { "model": "sg5x", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "sg208", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity r5 r5.1.46", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity audix r5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "intuity s3400", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity s3210", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "gsx server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.5.2" }, { "model": "stonegate sparc", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.12" }, { "model": "stonegate", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.5x86" }, { "model": "stonegate ibm zseries", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.5" }, { "model": "computing sidewinder", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "5.2.1.10" }, { "model": "security bsafe ssl-j sdk", "scope": "ne", "trust": 0.3, "vendor": "rsa", "version": "4.1" }, { "model": "project openssl d", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "project openssl m", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "litespeed web server", "scope": "ne", "trust": 0.3, "vendor": "lite speed", "version": "1.3.2" }, { "model": "litespeed web server", "scope": "ne", "trust": 0.3, "vendor": "lite speed", "version": "1.0.2" }, { "model": "secure gateway for solaris", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "1.14" }, { "model": "threat response", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.0.3" }, { "model": "mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90002.0(0.86)" }, { "model": "mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90001.3(3.33)" }, { "model": "point software vpn-1 sp6", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5a", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp4", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp6", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5a", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "webstar", "scope": "ne", "trust": 0.3, "vendor": "4d", "version": "5.3.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "fedora core2", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "fedora core1", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" } ], "sources": [ { "db": "CERT/CC", "id": "VU#484726" }, { "db": "CNVD", "id": "CNVD-2004-0790" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "CNNVD", "id": "CNNVD-200411-112" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:1.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:forcepoint:stonegate:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0112" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL Security Advisory", "sources": [ { "db": "CNNVD", "id": "CNNVD-200411-112" } ], "trust": 0.6 }, "cve": "CVE-2004-0112", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0112", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-8542", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0112", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#484726", "trust": 0.8, "value": "10.32" }, { "author": "CNNVD", "id": "CNNVD-200411-112", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-8542", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#484726" }, { "db": "VULHUB", "id": "VHN-8542" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "CNNVD", "id": "CNNVD-200411-112" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. OpenSSL for, Kerberos using a cipher suite SSL/TLS When communicating, there is a flaw in not properly checking the communication data during the key exchange during handshake, and it is intentionally created. Please note that this vulnerability OpenSSL Applications and systems using the library may also be affected. For more detailed information about other systems, NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please also check.OpenSSL Applications that use this crash and cause a denial of service. (DoS) may become a state. OpenSSL is an open source SSL implementation used to implement high-strength encryption of network communications. It is now widely used in various network applications. \n\n\u00a0When using Kerberos ciphersuites, there is a flaw in the SSL / TLS handshake code. A remote attacker can construct a special SSL / TLS handshake and send it to a server configured with Kerberos ciphersuites. Most applications do not use Kerberos ciphersuites. It is therefore not affected by this vulnerability. \nFor the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. \nThis entry will be retired when individual BID records are created for each issue. \n*Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. Multiple security vulnerabilities are reported to affect Apple Mac OS X; updates are available. \nApache is prone to five vulnerabilities ranging from buffer overflows to access validation vulnerabilities. The CVE Mitre candidate IDs CAN-2005-1344, CAN-2004-0942, CAN-2004-0885, CAN-2004-1083, and CAN-2004-1084 are assigned to these issues. \nAppkit is prone to three vulnerabilities. Two of these could result in arbitrary code execution, the third could permit the creation of local accounts. The CVE Mitre candidate IDs CAN-2005-2501, CAN-2005-2502, and CAN-2005-2503 are assigned to these issues. \nBluetooth is prone to a vulnerability regarding authentication bypass. The CVE Mitre candidate ID CAN-2005-2504 is assigned to this issue. \nCoreFoundation is prone to two vulnerabilities, one resulting in a buffer overflow, the other a denial-of-service vulnerability. The CVE Mitre candidate IDs CAN-2005-2505 and CAN-2005-2506 are assigned to these issues. \nCUPS is prone to two vulnerabilities resulting in a denial of service until the service can be restarted. The CVE Mitre candidate IDs CAN-2005-2525 and CAN-2005-2526 are assigned to these issues. \nDirectory Services is prone to three vulnerabilities. These issues vary from buffer overflow, unauthorized account creation and deletion, and privilege escalation. The CVE Mitre candidate IDs CAN-2005-2507, CAN-2005-2508 and CAN-2005-2519 are assigned to these issues. \nHItoolbox is prone to a vulnerability that could result in information disclosure. The CVE Mitre candidate ID CAN-2005-2513 is assigned to this issue. \nKerberos is prone to five vulnerabilities that may result in a buffer overflow, execution of arbitrary code, and root compromise. The CVE Mitre candidate IDs CAN-2004-1189, CAN-2005-1174, CAN-2005-1175, CAN-2005-1689, and CAN-2005-2511 are assigned to these issues. \nloginwindow is prone to a vulnerability that could permit a user to gain access to other logged-in accounts. The CVE Mitre candidate ID CAN-2005-2509 is assigned to this issue. \nMail is prone to a vulnerability regarding the loss of privacy when remote images are loaded into HTML email. The CVE Mitre candidate ID CAN-2005-2512 is assigned to this issue. \nMySQL is prone to three vulnerabilities that include arbitrary code execution by remote authenticated users. The CVE Mitre candidate IDs CAN-2005-0709, CAN-2005-0710, and CAN-2005-0711 are assigned to these issues. \nOpenSSL is prone to two vulnerabilities resulting in denial of service. The CVE Mitre candidate IDs CAN-2004-0079 and CAN-2004-0112 are assigned to these issues. \nping is prone to a vulnerability that could allow local privilege escalation and arbitrary code execution. The CVE Mitre candidate ID CAN-2005-2514 is assigned to this issue. \nQuartzComposerScreenSaver is prone to a vulnerability that could allow users to open pages while the RSS Visualizer screen is locked. The CVE Mitre candidate ID CAN-2005-2515 is assigned to this issue. \nSafari is prone to two vulnerabilities that could result in arbitrary command execution or have information submitted to an incorrect site. The CVE Mitre candidate IDs CAN-2005-2516 and CAN-2005-2517 are assigned to these issues. \nSecurityInterface is prone to a vulnerability that could expose recently used passwords. The CVE Mitre candidate ID CAN-2005-2520 is assigned to this issue. \nservermgrd is prone to a buffer-overflow vulnerability that could ultimately lead to the execution of arbitrary code. The CVE Mitre candidate ID CAN-2005-2518 is assigned to this issue. \nservermgr_ipfilter is prone to a vulnerability regarding firewall settings not always being written to the Active Rules. The CVE Mitre candidate ID CAN-2005-2510 is assigned to this issue. \nSquirrelMail is prone to two vulnerabilities including a cross-site scripting issue. The CVE Mitre candidate IDs CAN-2005-1769 and CAN-2005-2095 are assigned to these issues. \ntraceroute is prone to a vulnerability that could result in arbitrary code execution and privilege escalation. The CVE Mitre candidate ID CAN-2005-2521 is assigned to this issue. \nWebKit is affected by a vulnerability that could result in code execution regarding a malformed PDF file. The CVE Mitre candidate ID CAN-2005-2522 is assigned to this issue. \nWeblog Server is prone to multiple cross-site scripting vulnerabilities. The CVE Mitre candidate ID CAN-2005-2523 is assigned to this issue. \nX11 is prone to a vulnerability that could result in arbitrary code execution. The CVE Mitre candidate ID CAN-2005-0605 is assigned to this issue. \nzlib is prone to two denial-of-service vulnerabilities that may ultimately lead to arbitrary code execution. The CVE Mitre candidate IDs CAN-2005-2096 and CAN-2005-1849 are assigned to these issues. \nThese vulnerabilities will be separated into individual BIDs upon further analysis of the issues. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. \n\nTITLE:\nFedora update for openssl096b\n\nSECUNIA ADVISORY ID:\nSA17381\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17381/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nFedora Core 3\nhttp://secunia.com/product/4222/\n\nDESCRIPTION:\nFedora has issued an update for openssl096b. \n\nFor more information:\nSA10133\nSA11139\n\nSOLUTION:\nApply updated packages. \n\nFedora Core 3:\nhttp://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/\n\n8d68e4b430aa7c5ca067c12866ae694e\nSRPMS/openssl096b-0.9.6b-21.42.src.rpm\n54a9e78a2fdd625b9dc9121e09eb4398\nx86_64/openssl096b-0.9.6b-21.42.x86_64.rpm\nc5c6174e23eba8d038889d08f49231b8\nx86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm\n56b63fc150d0c099b2e4f0950e21005b\nx86_64/openssl096b-0.9.6b-21.42.i386.rpm\n56b63fc150d0c099b2e4f0950e21005b\ni386/openssl096b-0.9.6b-21.42.i386.rpm\n93195495585c7e9789041c75b1ed5380\ni386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm\n\nOTHER REFERENCES:\nSA10133:\nhttp://secunia.com/advisories/10133/\n\nSA11139:\nhttp://secunia.com/advisories/11139/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n Cisco Security Advisory: Cisco OpenSSL Implementation Vulnerability\n\nRevision 1.0\n\n For Public Release 2004 March 17 at 1300 UTC (GMT)\n\n ----------------------------------------------------------------------\n\nContents\n\n Summary\n Affected Products\n Details\n Impact\n Software Versions and Fixes\n Obtaining Fixed Software\n Workarounds\n Exploitation and Public Announcements\n Status of This Notice: INTERIM\n Distribution\n Revision History\n Cisco Security Procedures\n\n ----------------------------------------------------------------------\n\nSummary\n\n A new vulnerability in the OpenSSL implementation for SSL\n has been announced on March 17, 2004. \n\n An affected network device running an SSL server based on an affected\n OpenSSL implementation may be vulnerable to a Denial of Service (DoS)\n attack. There are workarounds available to mitigate the effects of this\n vulnerability on Cisco products in the workaround section of this\n advisory. Cisco is providing fixed software, and recommends that customers\n upgrade to it when it is available. \n\n This advisory will be posted at\n http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml. \n\n * Cisco IOS 12.1(11)E and later in the 12.1E release train. Only crypto\n images (56i and k2) are vulnerable for the Cisco 7100 and 7200 Series\n Routers. \n * Cisco IOS 12.2SY release train. Only crypto images (k8, k9 and k91)\n are vulnerable for the Cisco Catalyst 6500 Series and Cisco 7600\n Series Routers. \n * Cisco PIX Firewall\n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers\n * Cisco MDS 9000 Series Multilayer Switch\n * Cisco Content Service Switch (CSS) 11000 series\n * Cisco Global Site Selector (GSS) 4480\n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1\n * Cisco Access Registrar (CAR)\n\n The following products have their SSL implementation based on the OpenSSL\n code and are not affected by this vulnerability. \n\n * Cisco Secure Intrusion Detection System (NetRanger) appliance. This\n includes the IDS-42xx appliances, NM-CIDS and WS-SVS-IDSM2. \n * Cisco SN 5428 and SN 5428-2 Storage Router\n * Cisco CNS Configuration Engine\n * Cisco Network Analysis Modules (NAM) for the Cisco Catalyst 6000 and\n 6500 Series switches and Cisco 7600 Series routers\n * Cisco SIP Proxy Server (SPS)\n * CiscoWorks 1105 Hosting Solution Engine (HSE)\n * CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)\n * Cisco Ethernet Subscriber Solution Engine (ESSE)\n\n The following products, which implement SSL, are not affected by this\n vulnerability. \n\n * Cisco VPN 3000 Series Concentrators\n\n CatOS does not implement SSL and is not vulnerable. This vulnerability is still being actively investigated\n across Cisco products and status of some products has still not been\n determined. \n\nDetails\n\n Secure Sockets Layer (SSL), is a protocol used to encrypt the data\n transferred over an TCP session. SSL in Cisco products is mainly used by\n the HyperText Transfer Protocol Secure (HTTPS) web service for which the\n default TCP port is 443. The affected products, listed above, are only\n vulnerable if they have the HTTPS service enabled and the access to the\n service is not limited to trusted hosts or network management\n workstations. \n\n To check if the HTTPS service is enabled one can do the following:\n\n 1. Check the configuration on the device to verify the status of the\n HTTPS service. \n 2. Try to connect to the device using a standard web browser that\n supports SSL using a URL similar to https://ip_address_of_device/. \n 3. Try and connect to the default HTTPS port, TCP 443, using Telnet. \n telnet ip_address_of_device 443. If the session connects the service\n is enabled and accessible. \n\n Testing by the OpenSSL development team has uncovered a null-pointer\n assignment in the do_change_cipher_spec() function. This\n crash on many Cisco products would cause the device to reload. \n\n A third vulnerability described in the NISCC advisory is a bug in older\n versions of OpenSSL, versions before 0.9.6d, that can also lead to a\n Denial of Service attack. None of the Cisco OpenSSL implementations are\n known to be affected by this older OpenSSL issue. \n\n * Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2)\n image releases in the 12.1E release train for the Cisco 7100 and 7200\n Series Routers are affected by this vulnerability. All IOS software\n crypto (k8, k9, and k91) image releases in the 12.2SY release train\n for the Cisco Catalyst 6500 Series and Cisco 7600 Series Routers are\n affected by this vulnerability. The SSH implementation in IOS is not\n dependent on any OpenSSL code. SSH implementations in IOS do not\n handle certificates, yet, and therefore do not use any SSL code for\n SSH. OpenSSL in 12.1E and 12.2SY release trains is only used for\n providing the HTTPS and VPN Device Manager (VDM) services. This\n vulnerability is documented in the Cisco Bug Toolkit (registered\n customers only) as Bug ID CSCee00041. The HTTPS web service, that uses\n the OpenSSL code, on the device is disabled by default. The no ip http\n secure-server command may be used to disable the HTTPS web service on\n the device, if required. The SSH and IPSec services in IOS are not\n vulnerable to this vulnerability. \n * Cisco PIX Firewall - PIX 6.x releases are affected by this\n vulnerability. PIX 5.x releases do not contain any SSL code and are\n not vulnerable. This vulnerability is documented in the Cisco Bug\n Toolkit (registered customers only) as Bug ID CSCed90672. \n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee02055. \n * Cisco MDS 9000 Series Multilayer Switches - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCed96246. \n * Cisco Content Service Switch (CSS) 11000 series - WebNS version 6.x\n and 7.x are affected by this vulnerability. This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee01234 for SCM and is documented in the Cisco Bug Toolkit\n (registered customers only) as Bug ID CSCee01240 for the SSL module. \n * Cisco Global Site Selector (GSS) 4480 - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee01057. \n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1 - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCsa13748. \n * Cisco Access Registrar (CAR) - This vulnerability is documented in the\n Cisco Bug Toolkit (registered customers only) as Bug ID CSCee01956. \n\n The Internetworking Terms and Cisco Systems Acronyms online guides can be\n found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/. \n\nImpact\n\n An affected network device running an SSL server based on the OpenSSL\n implementation may be vulnerable to a Denial of Service (DoS) attack. \n\nSoftware Versions and Fixes\n\n * Cisco IOS -\n\n +----------------------------------------+\n |Release| Fixed Releases |Availability |\n | Train | | |\n |-------+------------------+-------------|\n |12.2SY |12.2(14)SY4 |March 25 |\n |-------+------------------+-------------|\n | |12.1(13)E14 |April 8 |\n |12.1E |12.1.(19)E7 |April 8 |\n | |12.1(20)E3 |April 26 |\n +----------------------------------------+\n\n * Cisco PIX Firewall - The vulnerability is fixed in software releases\n 6.0(4)102, 6.1(5)102, 6.2(3)107, and 6.3(3)124. These engineering\n builds may be obtained by contacting the Cisco Technical Assistance\n Center (TAC). TAC Contact information is given in the Obtaining Fixed\n Software section below. \n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers - The vulnerability is fixed in\n software release 1.1.3(14) which will be available by Monday, 22 of\n March, 2004. This engineering builds may be obtained by contacting the\n Cisco Technical Assistance Center (TAC). TAC Contact information is\n given in the Obtaining Fixed Software section below. \n * Cisco MDS 9000 Series Multilayer Switches - No fixed software release\n or software availability date has been determined yet. \n * Cisco Content Service Switch (CSS) 11000 series -No fixed software\n release or software availability date has been determined yet. \n * Cisco Global Site Selector (GSS) 4480 - No fixed software release or\n software availability date has been determined yet. \n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1 - No fixed software release or\n software availability date has been determined yet. \n * Cisco Access Registrar (CAR) - The vulnerability is fixed in software\n release 3.5.0.12 which will be available by Friday, 26 of March, 2004. \n\nObtaining Fixed Software\n\n Cisco is offering free software upgrades to address this vulnerability for\n all affected customers. \n\n Customers may only install and expect support for the feature sets they\n have purchased. By installing, downloading, accessing or otherwise using\n such software upgrades, Customers agree to be bound by the terms of\n Cisco\u0027s software license terms found at\n http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set\n forth at the Cisco Connection Online Software Center at\n http://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\n Customers with contracts should obtain upgraded software through their\n regular update channels. For most customers, this means that upgrades\n should be obtained through the Software Center on Cisco\u0027s worldwide\n website at http://www.cisco.com/tacpage/sw-center. To access the software\n download URL, you must be a registered user and you must be logged in. \n\n Customers whose Cisco products are provided or maintained through a prior\n or existing agreement with third-party support organizations such as Cisco\n Partners, authorized resellers, or service providers, should contact that\n support organization for assistance with obtaining the software\n upgrade(s). \n\n Customers who purchase direct from Cisco but who do not hold a Cisco\n service contract and customers who purchase through third-party vendors\n but are unsuccessful at obtaining fixed software through their point of\n sale should get their upgrades by contacting the Cisco Technical\n Assistance Center (TAC) using the contact information listed below. In\n these cases, customers are entitled to obtain a free upgrade to a later\n version of the same release or as indicated by the applicable corrected\n software version in the Software Versions and Fixes section (noted above). \n\n Cisco TAC contacts are as follows:\n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\n See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for\n additional TAC contact information, including special localized telephone\n numbers and instructions and e-mail addresses for use in various\n languages. \n\n Please have your product serial number available and give the URL of this\n notice as evidence of your entitlement to a upgrade. Upgrades for\n non-contract customers must be requested through the TAC. \n\n Please do not contact either \"psirt@cisco.com\" or\n \"security-alert@cisco.com\" for software upgrades. \n\nWorkarounds\n\n The Cisco PSIRT recommends that affected users upgrade to a fixed software\n version of code as soon as it is available. \n\n * Restrict access to the HTTPS server on the network device. Allow\n access to the network device only from trusted workstations by using\n access lists / MAC filters that are available on the affected\n platforms. \n * Disable the SSL server / service on the network device. This\n workaround must be weighed against the need for secure communications\n with the vulnerable device. \n\nExploitation and Public Announcements\n\n The Cisco PSIRT is not aware of any malicious use of the vulnerability\n described in this advisory. \n\nStatus of This Notice: INTERIM\n\n This is an interim advisory. Although Cisco cannot guarantee the accuracy\n of all statements in this advisory, all of the facts have been checked to\n the best of our ability. Cisco does not anticipate issuing updated\n versions of this advisory unless there is some material change in the\n facts. Should there be a significant change in the facts, Cisco may update\n this advisory. \n\n A stand-alone copy or paraphrase of the text of this security advisory\n that omits the distribution URL in the following section is an\n uncontrolled copy, and may lack important information or contain factual\n errors. \n\nDistribution\n\n This advisory will be posted on Cisco\u0027s worldwide website at\n http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml . \n\n In addition to worldwide web posting, a text version of this notice is\n clear-signed with the Cisco PSIRT PGP key having the fingerprint 8C82 5207\n 0CA9 ED40 1DD2 EE2A 7B31 A8CF 32B6 B590 and is posted to the following\n e-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org (includes CERT/CC)\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.netsys.com\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\n Future updates of this advisory, if any, will be placed on Cisco\u0027s\n worldwide website, but may or may not be actively announced on mailing\n lists or newsgroups. Users concerned about this problem are encouraged to\n check the above URL for any updates. \n\nRevision History\n\n +------------------------------------------+\n |Revision 1.0|2004-March-17|Initial |\n | | |release. |\n +------------------------------------------+\n\nCisco Security Procedures\n\n Complete information on reporting security vulnerabilities in Cisco\n products, obtaining assistance with security incidents, and registering to\n receive security information from Cisco, is available on Cisco\u0027s worldwide\n website at\n http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This\n includes instructions for press inquiries regarding Cisco security\n notices. All Cisco security advisories are available at\n http://www.cisco.com/go/psirt. \n\n This advisory is copyright 2004 by Cisco Systems, Inc. This advisory may\n be redistributed freely after the release date given at the top of the\n text, provided that redistributed copies are complete and unmodified,\n including all date and version information. \n\n ----------------------------------------------------------------------\n-----BEGIN PGP SIGNATURE-----\nComment: PGP Signed by Sharad Ahlawat, Cisco Systems PSIRT\n\niD8DBQFAWFvZezGozzK2tZARAqIwAKDXDMLAY6eDYyU8y1MhKZUto2SRxwCg+oid\n7AhsNlLsNVSLwTRKTHSigu0=\n=gtba\n-----END PGP SIGNATURE-----\n. \n\nOpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and\nFTP from the following master locations (you can find the various FTP\nmirrors under http://www.openssl.org/source/mirror.html):\n\n ftp://ftp.openssl.org/source/\n\nThe distribution file names are:\n\n o openssl-0.9.7d.tar.gz\n MD5 checksum: 1b49e90fc8a75c3a507c0a624529aca5\n \n o openssl-0.9.6m.tar.gz [normal]\n MD5 checksum: 1b63bfdca1c37837dddde9f1623498f9\n o openssl-engine-0.9.6m.tar.gz [engine]\n MD5 checksum: 4c39d2524bd466180f9077f8efddac8c\n\nThe checksums were calculated using the following command:\n\n openssl md5 openssl-0.9*.tar.gz\n\nCredits\n-------\n\nPatches for these issues were created by Dr Stephen Henson\n(steve@openssl.org) of the OpenSSL core team. The OpenSSL team would\nlike to thank Codenomicon for supplying the TLS Test Tool which was\nused to discover these vulnerabilities, and Joe Orton of Red Hat for\nperforming the majority of the testing. \n\nReferences\n----------\n\nhttp://www.codenomicon.com/testtools/tls/\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20040317.txt\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2004-0112" }, { "db": "CERT/CC", "id": "VU#484726" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "CNVD", "id": "CNVD-2004-0790" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" }, { "db": "VULHUB", "id": "VHN-8542" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "PACKETSTORM", "id": "32887" }, { "db": "PACKETSTORM", "id": "32886" } ], "trust": 3.87 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0112", "trust": 4.7 }, { "db": "CERT/CC", "id": "VU#484726", "trust": 3.3 }, { "db": "BID", "id": "9899", "trust": 2.8 }, { "db": "USCERT", "id": "TA04-078A", "trust": 2.5 }, { "db": "SECUNIA", "id": "11139", "trust": 1.7 }, { "db": "XF", "id": "15508", "trust": 0.8 }, { "db": "SECTRACK", "id": "1009458", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000088", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200411-112", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2004-0790", "trust": 0.6 }, { "db": "BID", "id": "14567", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-8542", "trust": 0.1 }, { "db": "SECUNIA", "id": "17398", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41200", "trust": 0.1 }, { "db": "SECUNIA", "id": "17381", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41105", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "32887", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "32886", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#484726" }, { "db": "CNVD", "id": "CNVD-2004-0790" }, { "db": "VULHUB", "id": "VHN-8542" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "PACKETSTORM", "id": "32887" }, { "db": "PACKETSTORM", "id": "32886" }, { "db": "CNNVD", "id": "CNNVD-200411-112" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "id": "VAR-200411-0171", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8542" } ], "trust": 0.52271296 }, "last_update_date": "2024-03-18T21:58:08.254000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[ important ]\u00a0OpenSSL Regarding vulnerability response Fujitsu \u00a0 Public vulnerability information", "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "title": "OpenSSL Repair measures for denial of service attack vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=169016" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "CNNVD", "id": "CNNVD-200411-112" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/9899" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta04-078a.html" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/484726" }, { "trust": 2.5, "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "trust": 1.8, "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2005/aug/msg00000.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2005//aug/msg00001.html" }, { "trust": 1.7, "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "trust": 1.7, "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:023" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1049" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a928" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9580" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-120.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-121.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11139" }, { "trust": 1.7, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "trust": 1.7, "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "trust": 1.7, "url": "http://www.trustix.org/errata/2004/0012" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "trust": 1.6, "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "trust": 1.6, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "trust": 1.1, "url": "http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt" }, { "trust": 1.1, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2004-005.txt.asc" }, { "trust": 1.1, "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt" }, { "trust": 0.8, "url": "http://www.openssl.org" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2712.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta04-078a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-224012" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta04-078a" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0112" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041201.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041301.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041701.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2004/wr041801.txt" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/15508" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2004/mar/1009458.html" }, { "trust": 0.8, "url": "http://www.securiteam.com/securitynews/5op0g20caa.html" }, { "trust": 0.6, "url": "https://rhn.redhat.com/errata/rhsa-2004-119.html" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524" }, { "trust": 0.3, "url": "http://www.4d.com/products/4dwsv.html" }, { "trust": 0.3, "url": "http://support.avaya.com/japple/css/japple?page=avaya.css.openpage\u0026temp.template.name=securityadvisory" }, { "trust": 0.3, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000827" }, { "trust": 0.3, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000834" }, { "trust": 0.3, "url": "ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt" }, { "trust": 0.3, "url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256" }, { "trust": 0.3, "url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257" }, { "trust": 0.3, "url": "http://www.netscreen.com/services/security/alerts/adv58466-signed.txt" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3123.html" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-239.htm" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/alerts/openssl.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-120.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-139.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-830.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html" }, { "trust": 0.3, "url": "http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm" }, { "trust": 0.3, "url": "http://www.securecomputing.com/pdf/52110relnotes.pdf" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571" }, { "trust": 0.3, "url": "http://www.tarantella.com/security/bulletin-10.html" }, { "trust": 0.3, "url": "http://www.adiscon.com/common/en/advisory/2004-03-18.asp" }, { "trust": 0.3, "url": "http://www.litespeedtech.com" }, { "trust": 0.3, "url": "/archive/1/357672" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.suresec.org/advisories/adv5.pdf" }, { "trust": 0.3, "url": "http://www.apple.com" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/11139/" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0079" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0112" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=107953412903636\u0026amp;w=2" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000834" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108403806509920\u0026amp;w=2" }, { "trust": 0.1, "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026amp;y=2004\u0026amp;m=slackware-security.455961" }, { "trust": 0.1, "url": "http://secunia.com/product/48/" }, { "trust": 0.1, "url": "http://rhn.redhat.com/errata/rhsa-2005-829.html" }, { "trust": 0.1, "url": "http://rhn.redhat.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/1326/" }, { "trust": 0.1, "url": "http://secunia.com/product/1306/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17398/" }, { "trust": 0.1, "url": "http://secunia.com/product/1044/" }, { "trust": 0.1, "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/" }, { "trust": 0.1, "url": "http://secunia.com/product/4222/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17381/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/10133/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml." }, { "trust": 0.1, "url": "http://www.cisco.com/public/sw-license-agreement.html," }, { "trust": 0.1, "url": "https://ip_address_of_device/." }, { "trust": 0.1, "url": "http://www.cisco.com/univercd/cc/td/doc/cisintwk/." }, { "trust": 0.1, "url": "http://www.cisco.com/tacpage/sw-center." }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/sec_incident_response.shtml." }, { "trust": 0.1, "url": "http://www.cisco.com/go/psirt." }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml" }, { "trust": 0.1, "url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml." }, { "trust": 0.1, "url": "http://www.codenomicon.com/testtools/tls/" }, { "trust": 0.1, "url": "http://www.openssl.org/source/mirror.html):" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0112" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0079" } ], "sources": [ { "db": "CERT/CC", "id": "VU#484726" }, { "db": "VULHUB", "id": "VHN-8542" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "PACKETSTORM", "id": "32887" }, { "db": "PACKETSTORM", "id": "32886" }, { "db": "CNNVD", "id": "CNNVD-200411-112" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#484726" }, { "db": "CNVD", "id": "CNVD-2004-0790" }, { "db": "VULHUB", "id": "VHN-8542" }, { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" }, { "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "db": "PACKETSTORM", "id": "41200" }, { "db": "PACKETSTORM", "id": "41105" }, { "db": "PACKETSTORM", "id": "32887" }, { "db": "PACKETSTORM", "id": "32886" }, { "db": "CNNVD", "id": "CNNVD-200411-112" }, { "db": "NVD", "id": "CVE-2004-0112" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-03-17T00:00:00", "db": "CERT/CC", "id": "VU#484726" }, { "date": "2004-03-17T00:00:00", "db": "CNVD", "id": "CNVD-2004-0790" }, { "date": "2004-11-23T00:00:00", "db": "VULHUB", "id": "VHN-8542" }, { "date": "2004-03-17T00:00:00", "db": "BID", "id": "9899" }, { "date": "2005-08-15T00:00:00", "db": "BID", "id": "14567" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "date": "2005-11-03T01:02:14", "db": "PACKETSTORM", "id": "41200" }, { "date": "2005-11-02T01:11:22", "db": "PACKETSTORM", "id": "41105" }, { "date": "2004-03-17T15:44:08", "db": "PACKETSTORM", "id": "32887" }, { "date": "2004-03-17T14:36:13", "db": "PACKETSTORM", "id": "32886" }, { "date": "2003-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-112" }, { "date": "2004-11-23T05:00:00", "db": "NVD", "id": "CVE-2004-0112" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-03-26T00:00:00", "db": "CERT/CC", "id": "VU#484726" }, { "date": "2004-03-17T00:00:00", "db": "CNVD", "id": "CNVD-2004-0790" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-8542" }, { "date": "2015-03-19T08:20:00", "db": "BID", "id": "9899" }, { "date": "2006-05-05T23:10:00", "db": "BID", "id": "14567" }, { "date": "2024-03-04T06:12:00", "db": "JVNDB", "id": "JVNDB-2004-000088" }, { "date": "2021-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-112" }, { "date": "2024-02-15T20:54:12.877000", "db": "NVD", "id": "CVE-2004-0112" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL does not adequately validate length of Kerberos ticket during SSL/TLS handshake", "sources": [ { "db": "CERT/CC", "id": "VU#484726" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "9899" }, { "db": "BID", "id": "14567" } ], "trust": 0.6 } }
gsd-2004-0112
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0112", "description": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "id": "GSD-2004-0112", "references": [ "https://www.suse.com/security/cve/CVE-2004-0112.html", "https://access.redhat.com/errata/RHSA-2004:121", "https://access.redhat.com/errata/RHSA-2004:120" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0112" ], "details": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.", "id": "GSD-2004-0112", "modified": "2023-12-13T01:22:54.777263Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9899", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9899" }, { "name": "SSRT4717", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "name": "RHSA-2004:121", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "name": "MDKSA-2004:023", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "name": "CLA-2004:834", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "name": "SCOSA-2004.10", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "name": "57524", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "name": "SuSE-SA:2004:007", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "name": "http://lists.apple.com/mhonarc/security-announce/msg00045.html", "refsource": "CONFIRM", "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "name": "http://www.openssl.org/news/secadv_20040317.txt", "refsource": "CONFIRM", "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "name": "NetBSD-SA2004-005", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "name": "O-101", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "name": "TA04-078A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "name": "oval:org.mitre.oval:def:1049", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "name": "openssl-kerberos-ciphersuites-dos(15508)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "name": "VU#484726", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/484726" }, { "name": "GLSA-200403-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "name": "oval:org.mitre.oval:def:9580", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" }, { "name": "11139", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11139" }, { "name": "RHSA-2004:120", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "name": "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "name": "APPLE-SA-2005-08-15", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "SSA:2004-077", "refsource": "SLACKWARE", "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "name": "2004-0012", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0012" }, { "name": "20040317 Cisco OpenSSL Implementation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "name": "http://docs.info.apple.com/article.html?artnum=61798", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "name": "APPLE-SA-2005-08-17", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:928", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C8D6949-89F4-40EF-98F4-8D15628DC345", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*", "matchCriteriaId": "6479D85C-1A12-486D-818C-6679F415CA26", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "287CF5FA-D0EC-4FD7-9718-973587EF34DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*", "matchCriteriaId": "C88168D4-7DB5-4720-8640-400BB680D0FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*", "matchCriteriaId": "968915A1-375B-4C69-BE11-9A393F7F1B0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "11465DCA-72E5-40E9-9D8E-B3CD470C47E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3954D0D1-9FDF-47D0-9710-D0FB06955B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E586558A-ABC3-42EB-8B4D-DC92A0D695E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2A4C5F60-B32D-4D85-BA28-AE11972ED614", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*", "matchCriteriaId": "6A5935C3-3D83-461F-BC26-E03362115C42", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "80AC523B-3106-46F2-B760-803DCF8061F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*", "matchCriteriaId": "F8B8D6F3-D15D-489F-A807-17E63F4831F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*", "matchCriteriaId": "808189BA-197F-49CE-933E-A728F395749C", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC7EF0CD-EA39-457B-8E2E-9120B65A5835", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7BC2983F-5212-464B-AC21-8A897DEC1F58", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBF17989-D1F2-4B04-80BD-CFABDD482ABA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "matchCriteriaId": "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*", "matchCriteriaId": "32310AFE-38CC-4C6C-AE13-54C18720F2C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630", "vulnerable": true }, { "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1E140F76-D078-4F58-89CF-3278CDCB9AF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D9D76A8D-832B-411E-A458-186733C66010", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "580BA1FE-0826-47A7-8BD3-9225E0841EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "040B04CD-B891-4F19-A7CC-5C2D462FBD6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", "matchCriteriaId": "5BF29685-7FFC-4093-A1D4-21E4871AF5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", "matchCriteriaId": "E72872C9-63AF-417F-BFAE-92B4D350C006", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "80BCF196-5E5A-4F31-BCE7-AA0C748CA922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "970939C5-1E6F-47B6-97E6-7B2C1E019985", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", "matchCriteriaId": "CD1F4148-E772-4708-8C1F-D67F969C11DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", "matchCriteriaId": "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8B87C95-4B34-4628-AD03-67D1DE13E097", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F04471C-732F-44EE-AD1B-6305C1DD7DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E237919A-416B-4039-AAD2-7FAE1F4E100D", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "39149924-188C-40C1-B598-A9CD407C90DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6501108-5455-48FE-AA82-37AFA5D7EC24", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "matchCriteriaId": "C1A3B951-A1F8-4291-82FA-AB7922D13ACE", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*", "matchCriteriaId": "9D0EF4A3-2FE5-41E4-A764-30B379ECF081", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*", "matchCriteriaId": "CCF6D59E-8AEA-4380-B86B-0803B2202F16", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*", "matchCriteriaId": "140ABF28-FA39-4D77-AEB2-304962ED48C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*", "matchCriteriaId": "09473DD9-5114-44C5-B56C-6630FBEBCACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7ECD3A4-5A39-4222-8350-524F11D8FFB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*", "matchCriteriaId": "D36C140D-E80C-479A-ADA7-18E901549059", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "940712E9-B041-4B7F-BD02-7DD0AE596D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03B887A2-9025-4C5B-8901-71BC63BF5293", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "33264586-7160-4550-9FF9-4101D72F5C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE5E6521-0611-4473-82AC-21655F10FEC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*", "matchCriteriaId": "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*", "matchCriteriaId": "8C83ABA2-87CD-429B-9800-590F8256B064", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*", "matchCriteriaId": "A4D9A576-2878-4AC4-AC95-E69CB8A84A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*", "matchCriteriaId": "0A1A0B02-CF33-401F-9AB2-D595E586C795", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*", "matchCriteriaId": "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "90FB3825-21A6-4DBE-8188-67672DBE01CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "80623E58-8B46-4559-89A4-C329AACF3CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AEE6C228-CD93-4636-868B-C19BC1674BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "A645148C-AD0D-46C1-BEE3-10F5C9066279", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*", "matchCriteriaId": "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*", "matchCriteriaId": "02029D75-FAF2-4842-9246-079C7DE36417", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*", "matchCriteriaId": "E0146341-364C-4085-A2E1-BC8C260FBA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*", "matchCriteriaId": "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8496E0D-2507-4C25-A122-0B846CBCA72A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E383F2A-DFCF-47F8-94EE-3563D41EA597", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D87EF0-056E-4128-89EB-2803ED83DEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB3163C1-2044-44DA-9C88-076D75FDF1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "07E1B690-C58B-4C08-A757-F3DF451FDAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "31F0E14C-7681-4D1A-B982-A51E450B93A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*", "matchCriteriaId": "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC604680-2E9E-4DC4-ACDD-74D552A45BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*", "matchCriteriaId": "37A94436-D092-4C7E-B87B-63BC621EE82E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "862165CF-3CFB-4C6E-8238-86FA85F243C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*", "matchCriteriaId": "056F3336-BAA8-4A03-90B4-7B31710FC1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*", "matchCriteriaId": "9FDC2510-FBB9-429A-B6D4-10AB11F93960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "5D45127E-A544-40A0-9D34-BD70D95C9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*", "matchCriteriaId": "56C69C3E-C895-45C8-8182-7BB412A0C828", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9564B-B92E-4C97-87FF-B56D62DCA775", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "FF2AD44D-3BE8-4541-B62D-9F01D46F8E6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "8BF2E08B-9046-41A1-BEDE-EB0B6436315C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "811E1BE8-3868-49F8-B6E8-D5705559B02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D67C9DB4-E46C-4E84-82D9-AF48EFDAEFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CF0E1BF0-6629-40DC-AB23-0256BABD0CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1AC4E7E5-FCC1-46B0-B69F-F1F6B36838ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C4AED89-F862-4071-8E94-481A59EDAE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A3CB6FF-3840-4E80-A0A4-614D6686D2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67010B0B-ECE7-4EE5-B103-05DC637E150F", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1355EF99-35FC-44A7-BC56-F7C0EA49BF0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "6DDA8F10-B059-4403-A790-EFC8822588B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "A06BCD31-3FB6-468B-9BC9-EA573717B19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "360238CC-3BF5-4750-B16D-8A2E0257022E", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0C55C754-E213-4E79-AA7B-2CAF8A464388", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "647BA524-5A79-408C-BBF2-5780BC522B64", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D599C49D-4D7D-4C44-9D8D-A3F76746BBA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B4DC717-0785-4C19-8A33-ACA5F378DF3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forcepoint:stonegate:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "858843D3-84BB-48B6-80D1-1271AE60150D", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*", "matchCriteriaId": "B931D4F8-23F5-4ABA-A457-959995D30C58", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*", "matchCriteriaId": "BE6A023E-9C2A-487F-B5CE-674C766BFE75", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*", "matchCriteriaId": "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A7B80E0-40BB-4B4E-9711-AF293A038DD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCFFE8-9CAD-4A7F-9751-8627E6297C9F", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3653856-207E-46A7-92DD-D7F377F1829A", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E4627BB-0D75-44BC-989F-0E85C9FA0E2B", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "19053434-F9E7-4839-AB5A-B226CC4616A5", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "D04CABBA-7BEB-44EC-A6E4-A31E41A62BD7", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "8D15C938-4DAB-4011-80EE-A2663E20BFC1", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9C056ED-2492-4B1C-BCB9-4F36806C4A48", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A72FC232-A2CB-443B-9A4A-8BBFEFE6517C", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:-:*:*:*:*:*:*", "matchCriteriaId": "BA347CD3-0619-4EA2-A736-B59EE9E3AC12", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "4ACEF29C-3225-43A7-9E07-FBCCF555887E", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "46D932AF-FB1A-464D-BA3D-2DC2D3C187CD", "vulnerable": false }, { "criteria": "cpe:2.3:a:litespeedtech:litespeed_web_server:1.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "9F532860-9E26-45C3-9FB3-6B0888F1279A", "vulnerable": false }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*", "matchCriteriaId": "E1B83F84-D1EF-43B4-8620-3C1BCCE44553", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "41169D2F-4F16-466A-82E9-AD0735472B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "947699C3-D9DE-411A-99C0-44ADD1D2223A", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*", "matchCriteriaId": "15F668C0-8420-4401-AB0F-479575596CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDDCC7B6-34CA-4551-9833-306B93E517BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "6D69C160-39F7-48B8-B9A3-CC86690453C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FA6420B-9F6A-48F4-A445-12B60A320347", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*", "matchCriteriaId": "09F3FB7B-0F68-49F3-A3B7-977A687A42E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*", "matchCriteriaId": "088F2FF7-96E5-455E-A35B-D99F9854EC6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*", "matchCriteriaId": "FFA721BF-1B2E-479F-BF25-02D441BF175B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "AFEDCE49-21CC-4168-818F-4C638EE3B077", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*", "matchCriteriaId": "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "26430687-409B-448F-934B-06AB937DDF63", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DF1A5808-6D5D-48AD-9470-5A6510D17913", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8D09E11C-C5BB-409E-BB0D-7F351250419B", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B06A05D-AA31-441D-9FC2-3558648C3B7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0886901-6F93-44C1-B774-84D7E5D9554C", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F203A80-7C1E-4A04-8E99-63525E176753", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA0A204C-158B-4014-A53C-75E0CD63E0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "085BA581-7DA5-4FA4-A888-351281FD0A7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "9519BCB2-B401-44CE-97F6-847BB36AE45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "BBE573E8-DD94-4293-99AE-27B9067B3ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "D14413DA-5199-4282-9E22-D347E9D8E469", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "05CC5F49-0E9E-45D8-827D-A5940566DB25", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "matchCriteriaId": "5D94EE19-6CE9-4E02-8174-D9954CDBF02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "matchCriteriaId": "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "matchCriteriaId": "8CE38F15-BD42-4171-8670-86AA8169A60C", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "20C0BD87-CE4B-49D2-89BE-EF282C43AD72", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C3E6C4A8-59F4-43EE-8413-E95289037598", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE76357A-27E6-4D85-9AA0-1BB658C41568", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C56C5FDB-24E2-479D-87CA-164CD28567D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019", "vulnerable": true }, { "criteria": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "12DE5E22-DF93-46BE-85A3-D4E04379E901", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF28C435-C036-4507-8E3F-44E722F9974A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F2CDFE7-6853-4A31-85C0-50C57A8D606A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*", "matchCriteriaId": "408A9DB0-81EF-4186-B338-44954E67289B", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*", "matchCriteriaId": "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*", "matchCriteriaId": "303362A5-9C3C-4C85-8C97-2AB12CE01BF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*", "matchCriteriaId": "FED22DC1-E06B-4511-B920-6DAB792262D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*", "matchCriteriaId": "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F757B2A7-869F-4702-81EB-466317A79D61", "vulnerable": true }, { "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F", "vulnerable": true }, { "criteria": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "64AF1E33-4086-43E2-8F54-DA75A99D4B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "53D16F03-A4C7-4497-AB74-499F208FF059", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "13A33EC1-836B-4C8C-AC18-B5BD4F90E612", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*", "matchCriteriaId": "09063867-0E64-4630-B35B-4CCA348E4DAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "78F98CD7-A352-483C-9968-8FB2627A7CBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F97FE485-705F-4707-B6C6-0EF9E8A85D5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9170562-872E-4C32-869C-B10FF35A925E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0927A68-8BB2-4F03-8396-E9CACC158FC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "559DDBA3-2AF4-4A0C-B219-6779BA931F21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "757DAE9A-B25D-4B8A-A41B-66C2897B537E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E3DC170-E279-4725-B9EE-6840B5685CC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*", "matchCriteriaId": "8091EDA9-BD18-47F7-8CEC-E086238647C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE05B514-F094-4632-B25B-973F976F6409", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3392428D-1A85-4472-A276-C482A78E2CE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*", "matchCriteriaId": "40954985-16E6-4F37-B014-6A55166AE093", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C097809-1FEF-4417-A201-42291CC29122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "descriptions": [ { "lang": "en", "value": "The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read." }, { "lang": "es", "value": "El c\u00f3digo que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una denegaci\u00f3n de servicio." } ], "id": "CVE-2004-0112", "lastModified": "2024-02-15T20:54:12.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/11139" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/484726" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9899" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0012" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15508" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.