Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-1278 (GCVE-0-2005-1278)
Vulnerability from cvelistv5 – Published: 2005-04-26 04:00 – Updated: 2024-08-07 21:44- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:44:05.791Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "13392",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/13392"
},
{
"name": "15125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/15125"
},
{
"name": "RHSA-2005:421",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"name": "20050426 tcpdump[v3.8.x/v3.9.1]: ISIS, BGP, and LDP infinite loop DOS exploits.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"name": "RHSA-2005:417",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"name": "FLSA:156139",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"name": "SCOSA-2005.60",
"tags": [
"vendor-advisory",
"x_refsource_SCO",
"x_transferred"
],
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"name": "oval:org.mitre.oval:def:10159",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
},
{
"name": "18146",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18146"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "13392",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/13392"
},
{
"name": "15125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/15125"
},
{
"name": "RHSA-2005:421",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"name": "20050426 tcpdump[v3.8.x/v3.9.1]: ISIS, BGP, and LDP infinite loop DOS exploits.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"name": "RHSA-2005:417",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"name": "FLSA:156139",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"name": "SCOSA-2005.60",
"tags": [
"vendor-advisory",
"x_refsource_SCO"
],
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"name": "oval:org.mitre.oval:def:10159",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
},
{
"name": "18146",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18146"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2005-1278",
"datePublished": "2005-04-26T04:00:00",
"dateReserved": "2005-04-26T00:00:00",
"dateUpdated": "2024-08-07T21:44:05.791Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.9.1\", \"matchCriteriaId\": \"59B480A7-0CF4-4525-8902-E9EBD0BFD1EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.\"}]",
"id": "CVE-2005-1278",
"lastModified": "2024-11-20T23:56:58.783",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2005-05-02T04:00:00.000",
"references": "[{\"url\": \"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/15125\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/18146\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-417.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-421.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/396932\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/430292/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/13392\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/15125\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/18146\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-417.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-421.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/396932\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/430292/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/13392\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2005-1278\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9.1\",\"matchCriteriaId\":\"59B480A7-0CF4-4525-8902-E9EBD0BFD1EA\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/15125\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18146\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-417.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-421.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/396932\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/430292/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/13392\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/15125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18146\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-417.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-421.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/396932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/430292/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/13392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2005_417
Vulnerability from csaf_redhat - Published: 2005-05-11 08:40 - Updated: 2024-11-21 23:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tcpdump packages that fix several security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\nThis updated package also adds support for output files larger than 2 GB.",
"title": "Topic"
},
{
"category": "general",
"text": "Tcpdump is a command-line tool for monitoring network traffic.\n\nSeveral denial of service bugs were found in the way tcpdump processes\ncertain network packets. It is possible for an attacker to inject a\ncarefully crafted packet onto the network, crashing a running tcpdump\nsession. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280 to\nthese issues.\n\nThe tcpdump utility can now write a file larger than 2 GB. \n\nUsers of tcpdump are advised to upgrade to these erratum packages, which\ncontain backported security patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:417",
"url": "https://access.redhat.com/errata/RHSA-2005:417"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "147840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=147840"
},
{
"category": "external",
"summary": "156040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_417.json"
}
],
"title": "Red Hat Security Advisory: tcpdump security update",
"tracking": {
"current_release_date": "2024-11-21T23:44:40+00:00",
"generator": {
"date": "2024-11-21T23:44:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2005:417",
"initial_release_date": "2005-05-11T08:40:00+00:00",
"revision_history": [
{
"date": "2005-05-11T08:40:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-05-11T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-21T23:44:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.i386",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386",
"product_id": "libpcap-14:0.8.3-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=i386\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.src",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=src\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ppc64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ppc64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product_id": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.s390",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390",
"product_id": "libpcap-14:0.8.3-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=s390\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-1278",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617628"
}
],
"notes": [
{
"category": "description",
"text": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1278"
},
{
"category": "external",
"summary": "RHBZ#1617628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1279",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617629"
}
],
"notes": [
{
"category": "description",
"text": "tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1279"
},
{
"category": "external",
"summary": "RHBZ#1617629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617629"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1279",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1279"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1280",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617630"
}
],
"notes": [
{
"category": "description",
"text": "The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1280"
},
{
"category": "external",
"summary": "RHBZ#1617630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617630"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
RHSA-2005:417
Vulnerability from csaf_redhat - Published: 2005-05-11 08:40 - Updated: 2025-11-21 17:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tcpdump packages that fix several security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\nThis updated package also adds support for output files larger than 2 GB.",
"title": "Topic"
},
{
"category": "general",
"text": "Tcpdump is a command-line tool for monitoring network traffic.\n\nSeveral denial of service bugs were found in the way tcpdump processes\ncertain network packets. It is possible for an attacker to inject a\ncarefully crafted packet onto the network, crashing a running tcpdump\nsession. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280 to\nthese issues.\n\nThe tcpdump utility can now write a file larger than 2 GB. \n\nUsers of tcpdump are advised to upgrade to these erratum packages, which\ncontain backported security patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:417",
"url": "https://access.redhat.com/errata/RHSA-2005:417"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "147840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=147840"
},
{
"category": "external",
"summary": "156040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_417.json"
}
],
"title": "Red Hat Security Advisory: tcpdump security update",
"tracking": {
"current_release_date": "2025-11-21T17:29:05+00:00",
"generator": {
"date": "2025-11-21T17:29:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2005:417",
"initial_release_date": "2005-05-11T08:40:00+00:00",
"revision_history": [
{
"date": "2005-05-11T08:40:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-05-11T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:29:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ia64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.i386",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386",
"product_id": "libpcap-14:0.8.3-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=i386\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=x86_64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.src",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=src\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ppc64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ppc64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product_id": "libpcap-14:0.8.3-9.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=ppc\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product_id": "libpcap-14:0.8.3-9.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=s390x\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product_id": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.8.2-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "libpcap-14:0.8.3-9.RHEL4.s390",
"product": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390",
"product_id": "libpcap-14:0.8.3-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.8.3-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product_id": "tcpdump-14:3.8.2-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.8.2-9.RHEL4?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product_id": "arpwatch-14:2.1a13-9.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/arpwatch@2.1a13-9.RHEL4?arch=s390\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.i386"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.ia64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.ppc"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.s390"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.s390x"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arpwatch-14:2.1a13-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64"
},
"product_reference": "arpwatch-14:2.1a13-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.i386"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ia64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ppc"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.ppc64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.s390"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.s390x"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.8.3-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libpcap-14:0.8.3-9.RHEL4.x86_64"
},
"product_reference": "libpcap-14:0.8.3-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.src"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-1278",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617628"
}
],
"notes": [
{
"category": "description",
"text": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1278"
},
{
"category": "external",
"summary": "RHBZ#1617628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1279",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617629"
}
],
"notes": [
{
"category": "description",
"text": "tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1279"
},
{
"category": "external",
"summary": "RHBZ#1617629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617629"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1279",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1279"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1280",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617630"
}
],
"notes": [
{
"category": "description",
"text": "The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1280"
},
{
"category": "external",
"summary": "RHBZ#1617630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617630"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:40:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4AS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4AS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4AS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4AS:libpcap-14:0.8.3-9.RHEL4.i386",
"4AS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4AS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390",
"4AS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4AS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-14:3.8.2-9.RHEL4.src",
"4AS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4AS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.i386",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4Desktop:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.i386",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ia64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.s390x",
"4Desktop:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.src",
"4Desktop:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4Desktop:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.i386",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4ES:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390",
"4ES:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4ES:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4ES:libpcap-14:0.8.3-9.RHEL4.i386",
"4ES:libpcap-14:0.8.3-9.RHEL4.ia64",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc",
"4ES:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390",
"4ES:libpcap-14:0.8.3-9.RHEL4.s390x",
"4ES:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-14:3.8.2-9.RHEL4.src",
"4ES:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4ES:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.i386",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ia64",
"4WS:arpwatch-14:2.1a13-9.RHEL4.ppc",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390",
"4WS:arpwatch-14:2.1a13-9.RHEL4.s390x",
"4WS:arpwatch-14:2.1a13-9.RHEL4.x86_64",
"4WS:libpcap-14:0.8.3-9.RHEL4.i386",
"4WS:libpcap-14:0.8.3-9.RHEL4.ia64",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc",
"4WS:libpcap-14:0.8.3-9.RHEL4.ppc64",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390",
"4WS:libpcap-14:0.8.3-9.RHEL4.s390x",
"4WS:libpcap-14:0.8.3-9.RHEL4.x86_64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-14:3.8.2-9.RHEL4.src",
"4WS:tcpdump-14:3.8.2-9.RHEL4.x86_64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.i386",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ia64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.ppc64",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.s390x",
"4WS:tcpdump-debuginfo-14:3.8.2-9.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:417"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
RHSA-2005_421
Vulnerability from csaf_redhat - Published: 2005-05-11 08:37 - Updated: 2024-11-21 23:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tcpdump packages that fix several security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\nThese updated packages also add support for output files larger than 2 GB,\nadd support for some new VLAN IDs, and fix message parsing on 64bit\narchitectures.",
"title": "Topic"
},
{
"category": "general",
"text": "Tcpdump is a command-line tool for monitoring network traffic.\n\nSeveral denial of service bugs were found in the way tcpdump processes\ncertain network packets. It is possible for an attacker to inject a\ncarefully crafted packet onto the network, crashing a running tcpdump\nsession. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280 to\nthese issues.\n\nAdditionally, the tcpdump utility can now write a file larger than 2 GB,\nparse some new VLAN IDs, and parse messages on 64bit architectures. \n\nUsers of tcpdump are advised to upgrade to these erratum packages, which\ncontain backported security patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:421",
"url": "https://access.redhat.com/errata/RHSA-2005:421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "132781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=132781"
},
{
"category": "external",
"summary": "147840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=147840"
},
{
"category": "external",
"summary": "156040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_421.json"
}
],
"title": "Red Hat Security Advisory: tcpdump security update",
"tracking": {
"current_release_date": "2024-11-21T23:44:44+00:00",
"generator": {
"date": "2024-11-21T23:44:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2005:421",
"initial_release_date": "2005-05-11T08:37:00+00:00",
"revision_history": [
{
"date": "2005-05-11T08:37:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-05-11T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-21T23:44:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ia64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64",
"product_id": "libpcap-14:0.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product_id": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.i386",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.i386",
"product_id": "libpcap-14:0.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.i386",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386",
"product_id": "tcpdump-14:3.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product_id": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product_id": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.src",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.src",
"product_id": "tcpdump-14:3.7.2-7.E3.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=src\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product_id": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ppc64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ppc64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ppc",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc",
"product_id": "libpcap-14:0.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product_id": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.s390x",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x",
"product_id": "libpcap-14:0.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product_id": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.s390",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.s390",
"product_id": "libpcap-14:0.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.s390",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390",
"product_id": "tcpdump-14:3.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-1278",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617628"
}
],
"notes": [
{
"category": "description",
"text": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1278"
},
{
"category": "external",
"summary": "RHBZ#1617628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1279",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617629"
}
],
"notes": [
{
"category": "description",
"text": "tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1279"
},
{
"category": "external",
"summary": "RHBZ#1617629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617629"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1279",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1279"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1280",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617630"
}
],
"notes": [
{
"category": "description",
"text": "The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1280"
},
{
"category": "external",
"summary": "RHBZ#1617630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617630"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
RHSA-2005:421
Vulnerability from csaf_redhat - Published: 2005-05-11 08:37 - Updated: 2025-11-21 17:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tcpdump packages that fix several security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\nThese updated packages also add support for output files larger than 2 GB,\nadd support for some new VLAN IDs, and fix message parsing on 64bit\narchitectures.",
"title": "Topic"
},
{
"category": "general",
"text": "Tcpdump is a command-line tool for monitoring network traffic.\n\nSeveral denial of service bugs were found in the way tcpdump processes\ncertain network packets. It is possible for an attacker to inject a\ncarefully crafted packet onto the network, crashing a running tcpdump\nsession. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280 to\nthese issues.\n\nAdditionally, the tcpdump utility can now write a file larger than 2 GB,\nparse some new VLAN IDs, and parse messages on 64bit architectures. \n\nUsers of tcpdump are advised to upgrade to these erratum packages, which\ncontain backported security patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:421",
"url": "https://access.redhat.com/errata/RHSA-2005:421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "132781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=132781"
},
{
"category": "external",
"summary": "147840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=147840"
},
{
"category": "external",
"summary": "156040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156040"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_421.json"
}
],
"title": "Red Hat Security Advisory: tcpdump security update",
"tracking": {
"current_release_date": "2025-11-21T17:29:05+00:00",
"generator": {
"date": "2025-11-21T17:29:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2005:421",
"initial_release_date": "2005-05-11T08:37:00+00:00",
"revision_history": [
{
"date": "2005-05-11T08:37:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-05-11T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:29:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ia64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64",
"product_id": "libpcap-14:0.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product_id": "tcpdump-14:3.7.2-7.E3.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=ia64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.i386",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.i386",
"product_id": "libpcap-14:0.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.i386",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386",
"product_id": "tcpdump-14:3.7.2-7.E3.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=i386\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product_id": "libpcap-14:0.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product_id": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=x86_64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.src",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.src",
"product_id": "tcpdump-14:3.7.2-7.E3.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=src\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product_id": "libpcap-14:0.7.2-7.E3.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ppc64\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ppc64\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.ppc",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc",
"product_id": "libpcap-14:0.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product_id": "tcpdump-14:3.7.2-7.E3.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=ppc\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.s390x",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x",
"product_id": "libpcap-14:0.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product_id": "tcpdump-14:3.7.2-7.E3.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=s390x\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpcap-14:0.7.2-7.E3.5.s390",
"product": {
"name": "libpcap-14:0.7.2-7.E3.5.s390",
"product_id": "libpcap-14:0.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libpcap@0.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product_id": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump-debuginfo@3.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
},
{
"category": "product_version",
"name": "tcpdump-14:3.7.2-7.E3.5.s390",
"product": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390",
"product_id": "tcpdump-14:3.7.2-7.E3.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tcpdump@3.7.2-7.E3.5?arch=s390\u0026epoch=14"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.i386"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ia64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ppc"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.ppc64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.s390"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.s390x"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpcap-14:0.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:libpcap-14:0.7.2-7.E3.5.x86_64"
},
"product_reference": "libpcap-14:0.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.src"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
},
"product_reference": "tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-1278",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617628"
}
],
"notes": [
{
"category": "description",
"text": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1278"
},
{
"category": "external",
"summary": "RHBZ#1617628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1279",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617629"
}
],
"notes": [
{
"category": "description",
"text": "tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1279"
},
{
"category": "external",
"summary": "RHBZ#1617629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617629"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1279",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1279"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1279"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2005-1280",
"discovery_date": "2005-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617630"
}
],
"notes": [
{
"category": "description",
"text": "The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-1280"
},
{
"category": "external",
"summary": "RHBZ#1617630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617630"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1280"
}
],
"release_date": "2005-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-05-11T08:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:libpcap-14:0.7.2-7.E3.5.i386",
"3AS:libpcap-14:0.7.2-7.E3.5.ia64",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc",
"3AS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3AS:libpcap-14:0.7.2-7.E3.5.s390",
"3AS:libpcap-14:0.7.2-7.E3.5.s390x",
"3AS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3AS:tcpdump-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-14:3.7.2-7.E3.5.src",
"3AS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3AS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.i386",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ia64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc",
"3Desktop:libpcap-14:0.7.2-7.E3.5.ppc64",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390",
"3Desktop:libpcap-14:0.7.2-7.E3.5.s390x",
"3Desktop:libpcap-14:0.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.src",
"3Desktop:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3Desktop:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3ES:libpcap-14:0.7.2-7.E3.5.i386",
"3ES:libpcap-14:0.7.2-7.E3.5.ia64",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc",
"3ES:libpcap-14:0.7.2-7.E3.5.ppc64",
"3ES:libpcap-14:0.7.2-7.E3.5.s390",
"3ES:libpcap-14:0.7.2-7.E3.5.s390x",
"3ES:libpcap-14:0.7.2-7.E3.5.x86_64",
"3ES:tcpdump-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-14:3.7.2-7.E3.5.src",
"3ES:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3ES:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64",
"3WS:libpcap-14:0.7.2-7.E3.5.i386",
"3WS:libpcap-14:0.7.2-7.E3.5.ia64",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc",
"3WS:libpcap-14:0.7.2-7.E3.5.ppc64",
"3WS:libpcap-14:0.7.2-7.E3.5.s390",
"3WS:libpcap-14:0.7.2-7.E3.5.s390x",
"3WS:libpcap-14:0.7.2-7.E3.5.x86_64",
"3WS:tcpdump-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-14:3.7.2-7.E3.5.src",
"3WS:tcpdump-14:3.7.2-7.E3.5.x86_64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.i386",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ia64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.ppc64",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.s390x",
"3WS:tcpdump-debuginfo-14:3.7.2-7.E3.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:421"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
GHSA-24QH-5JCC-QHQQ
Vulnerability from github – Published: 2022-05-03 03:14 – Updated: 2022-05-03 03:14The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.
{
"affected": [],
"aliases": [
"CVE-2005-1278"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2005-05-02T04:00:00Z",
"severity": "MODERATE"
},
"details": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"id": "GHSA-24qh-5jcc-qhqq",
"modified": "2022-05-03T03:14:09Z",
"published": "2022-05-03T03:14:09Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1278"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/15125"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/18146"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/13392"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2005-AVI-033
Vulnerability from certfr_avis - Published: - Updated:
Un utilisateur distant mal intentionné peut provoquer l'arrêt du service DNS (et par ricochet de tout service utilisant la résolution de nom), en abusant d'une faille concernant soit les versions 8.4.4 et 8.4.5, soit la version 9.3.0.
Description
-
Versions 8.4.4 et 8.4.5 (CAN-2005-0033) :
les interrogations déjà réalisées sont stockées dans un tableau dont les limites mémoire sont mal gérées et peuvent donc provoquer un déni de service par débordement.
-
Version 9.3.0 (CAN-2005-0034) :
Un test de validation DNSSEC est basé sur un postulat incorrect et peut donc interrompre le service lors d'une requête légitime d'après la norme.
Contournement provisoire
-
Versions 8.4.4 et 8.4.5 :
Désactiver l'interrogation récursive («recursion»), s'il ne s'agit pas d'un serveur cache, ainsi que la récupération des enregistrements annexes («glue fetching» : récupération de l'adresse IP en sus lors d'une interrogation NS, par exemple).
-
Version 9.3.0 :
Désactiver DNSSEC ou simplement la validation DNSSEC dans les options.
Solution
Mettre à jour les sources en version 8.4.6 ou 9.3.1beta2 au moins.
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tout syst\u00e8me offrant un service DNS par l\u0027interm\u00e9diaire de \u003cSPAN class=\"textit\"\u003eBIND\u003c/SPAN\u003e en versions 8.4.4, 8.4.5 et 9.3.0.",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Description\n\n- Versions 8.4.4 et 8.4.5 (CAN-2005-0033) :\n\n les interrogations d\u00e9j\u00e0 r\u00e9alis\u00e9es sont stock\u00e9es dans un tableau dont\n les limites m\u00e9moire sont mal g\u00e9r\u00e9es et peuvent donc provoquer un\n d\u00e9ni de service par d\u00e9bordement.\n\n- Version 9.3.0 (CAN-2005-0034) :\n\n Un test de validation DNSSEC est bas\u00e9 sur un postulat incorrect et\n peut donc interrompre le service lors d\u0027une requ\u00eate l\u00e9gitime d\u0027apr\u00e8s\n la norme.\n\n## Contournement provisoire\n\n- Versions 8.4.4 et 8.4.5 :\n\n D\u00e9sactiver l\u0027interrogation r\u00e9cursive (\u00abrecursion\u00bb), s\u0027il ne s\u0027agit\n pas d\u0027un serveur cache, ainsi que la r\u00e9cup\u00e9ration des\n enregistrements annexes (\u00abglue fetching\u00bb : r\u00e9cup\u00e9ration de l\u0027adresse\n IP en sus lors d\u0027une interrogation NS, par exemple).\n\n- Version 9.3.0 :\n\n D\u00e9sactiver DNSSEC ou simplement la validation DNSSEC dans les\n options.\n\n## Solution\n\nMettre \u00e0 jour les sources en version 8.4.6 ou 9.3.1beta2 au moins.\n",
"cves": [
{
"name": "CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"name": "CVE-2005-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0034"
}
],
"links": [
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD bind8 et bind9 :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/net/bind8/README.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:023 du 26 janvier 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:023"
},
{
"title": "Site Internet d\u0027ISC BIND :",
"url": "http://www.isc.org"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD bind8 et bind9 :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/net/bind9/README.html"
},
{
"title": "Note de vuln\u00e9rabilit\u00e9 #938617 de l\u0027US-CERT sur BIND 9 :",
"url": "http://www.kb.cert.org/vuls/id/938617"
},
{
"title": "Note de vuln\u00e9rabilit\u00e9 #327633 de l\u0027US-CERT sur BIND 8 :",
"url": "http://www.kb.cert.org/vuls/id/327633"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-05:12 du 09 juin 2005 :",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:12.bind9.asc"
}
],
"reference": "CERTA-2005-AVI-033",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-01-27T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence CVE et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandrake et NetBSD.",
"revision_date": "2005-01-31T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2005-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Un utilisateur distant mal intentionn\u00e9 peut provoquer l\u0027arr\u00eat du service\nDNS (et par ricochet de tout service utilisant la r\u00e9solution de nom), en\nabusant d\u0027une faille concernant soit les versions 8.4.4 et 8.4.5, soit\nla version 9.3.0.\n",
"title": "Vuln\u00e9rabilit\u00e9 des serveurs DNS BIND",
"vendor_advisories": [
{
"published_at": "2005-01-25",
"title": "Bulletin de s\u00e9curit\u00e9 20050125-00060 du NISCC sur BIND 9",
"url": "http://www.niscc.gov.uk/niscc/docs/al-20050125-00060.html"
},
{
"published_at": "2005-01-25",
"title": "Bulletin de s\u00e9curit\u00e9 20050125-00059 du NISCC sur BIND 8",
"url": "http://www.niscc.gov.uk/niscc/docs/al-20050125-00059.html"
}
]
}
CERTA-2005-AVI-033
Vulnerability from certfr_avis - Published: - Updated:
Un utilisateur distant mal intentionné peut provoquer l'arrêt du service DNS (et par ricochet de tout service utilisant la résolution de nom), en abusant d'une faille concernant soit les versions 8.4.4 et 8.4.5, soit la version 9.3.0.
Description
-
Versions 8.4.4 et 8.4.5 (CAN-2005-0033) :
les interrogations déjà réalisées sont stockées dans un tableau dont les limites mémoire sont mal gérées et peuvent donc provoquer un déni de service par débordement.
-
Version 9.3.0 (CAN-2005-0034) :
Un test de validation DNSSEC est basé sur un postulat incorrect et peut donc interrompre le service lors d'une requête légitime d'après la norme.
Contournement provisoire
-
Versions 8.4.4 et 8.4.5 :
Désactiver l'interrogation récursive («recursion»), s'il ne s'agit pas d'un serveur cache, ainsi que la récupération des enregistrements annexes («glue fetching» : récupération de l'adresse IP en sus lors d'une interrogation NS, par exemple).
-
Version 9.3.0 :
Désactiver DNSSEC ou simplement la validation DNSSEC dans les options.
Solution
Mettre à jour les sources en version 8.4.6 ou 9.3.1beta2 au moins.
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tout syst\u00e8me offrant un service DNS par l\u0027interm\u00e9diaire de \u003cSPAN class=\"textit\"\u003eBIND\u003c/SPAN\u003e en versions 8.4.4, 8.4.5 et 9.3.0.",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Description\n\n- Versions 8.4.4 et 8.4.5 (CAN-2005-0033) :\n\n les interrogations d\u00e9j\u00e0 r\u00e9alis\u00e9es sont stock\u00e9es dans un tableau dont\n les limites m\u00e9moire sont mal g\u00e9r\u00e9es et peuvent donc provoquer un\n d\u00e9ni de service par d\u00e9bordement.\n\n- Version 9.3.0 (CAN-2005-0034) :\n\n Un test de validation DNSSEC est bas\u00e9 sur un postulat incorrect et\n peut donc interrompre le service lors d\u0027une requ\u00eate l\u00e9gitime d\u0027apr\u00e8s\n la norme.\n\n## Contournement provisoire\n\n- Versions 8.4.4 et 8.4.5 :\n\n D\u00e9sactiver l\u0027interrogation r\u00e9cursive (\u00abrecursion\u00bb), s\u0027il ne s\u0027agit\n pas d\u0027un serveur cache, ainsi que la r\u00e9cup\u00e9ration des\n enregistrements annexes (\u00abglue fetching\u00bb : r\u00e9cup\u00e9ration de l\u0027adresse\n IP en sus lors d\u0027une interrogation NS, par exemple).\n\n- Version 9.3.0 :\n\n D\u00e9sactiver DNSSEC ou simplement la validation DNSSEC dans les\n options.\n\n## Solution\n\nMettre \u00e0 jour les sources en version 8.4.6 ou 9.3.1beta2 au moins.\n",
"cves": [
{
"name": "CVE-2005-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-1278"
},
{
"name": "CVE-2005-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0034"
}
],
"links": [
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD bind8 et bind9 :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/net/bind8/README.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:023 du 26 janvier 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:023"
},
{
"title": "Site Internet d\u0027ISC BIND :",
"url": "http://www.isc.org"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD bind8 et bind9 :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/net/bind9/README.html"
},
{
"title": "Note de vuln\u00e9rabilit\u00e9 #938617 de l\u0027US-CERT sur BIND 9 :",
"url": "http://www.kb.cert.org/vuls/id/938617"
},
{
"title": "Note de vuln\u00e9rabilit\u00e9 #327633 de l\u0027US-CERT sur BIND 8 :",
"url": "http://www.kb.cert.org/vuls/id/327633"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-05:12 du 09 juin 2005 :",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:12.bind9.asc"
}
],
"reference": "CERTA-2005-AVI-033",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-01-27T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence CVE et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandrake et NetBSD.",
"revision_date": "2005-01-31T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2005-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Un utilisateur distant mal intentionn\u00e9 peut provoquer l\u0027arr\u00eat du service\nDNS (et par ricochet de tout service utilisant la r\u00e9solution de nom), en\nabusant d\u0027une faille concernant soit les versions 8.4.4 et 8.4.5, soit\nla version 9.3.0.\n",
"title": "Vuln\u00e9rabilit\u00e9 des serveurs DNS BIND",
"vendor_advisories": [
{
"published_at": "2005-01-25",
"title": "Bulletin de s\u00e9curit\u00e9 20050125-00060 du NISCC sur BIND 9",
"url": "http://www.niscc.gov.uk/niscc/docs/al-20050125-00060.html"
},
{
"published_at": "2005-01-25",
"title": "Bulletin de s\u00e9curit\u00e9 20050125-00059 du NISCC sur BIND 8",
"url": "http://www.niscc.gov.uk/niscc/docs/al-20050125-00059.html"
}
]
}
FKIE_CVE-2005-1278
Vulnerability from fkie_nvd - Published: 2005-05-02 04:00 - Updated: 2025-04-03 01:03{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59B480A7-0CF4-4525-8902-E9EBD0BFD1EA",
"versionEndIncluding": "3.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet."
}
],
"id": "CVE-2005-1278",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-05-02T04:00:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/15125"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/18146"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/13392"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/15125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/18146"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/13392"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2005-1278
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2005-1278",
"description": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"id": "GSD-2005-1278",
"references": [
"https://www.suse.com/security/cve/CVE-2005-1278.html",
"https://access.redhat.com/errata/RHSA-2005:421",
"https://access.redhat.com/errata/RHSA-2005:417"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2005-1278"
],
"details": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.",
"id": "GSD-2005-1278",
"modified": "2023-12-13T01:20:11.339069Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-1278",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt",
"refsource": "MISC",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"name": "http://secunia.com/advisories/15125",
"refsource": "MISC",
"url": "http://secunia.com/advisories/15125"
},
{
"name": "http://secunia.com/advisories/18146",
"refsource": "MISC",
"url": "http://secunia.com/advisories/18146"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2005-417.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2005-421.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"name": "http://www.securityfocus.com/archive/1/396932",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"name": "http://www.securityfocus.com/archive/1/430292/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/13392",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/13392"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-1278"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050426 tcpdump[v3.8.x/v3.9.1]: ISIS, BGP, and LDP infinite loop DOS exploits.",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/396932"
},
{
"name": "RHSA-2005:417",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2005-417.html"
},
{
"name": "RHSA-2005:421",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2005-421.html"
},
{
"name": "SCOSA-2005.60",
"refsource": "SCO",
"tags": [],
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt"
},
{
"name": "18146",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/18146"
},
{
"name": "15125",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/15125"
},
{
"name": "13392",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/13392"
},
{
"name": "oval:org.mitre.oval:def:10159",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159"
},
{
"name": "FLSA:156139",
"refsource": "FEDORA",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/430292/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-19T15:31Z",
"publishedDate": "2005-05-02T04:00Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.