Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2006-4339
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "ADV-2006-4750", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SSRT061273", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "ADV-2006-3453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "name": "23915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23915" }, { "name": "201534", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "name": "HPSBMA02250", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "JVN#51615542", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN51615542/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "60799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60799" }, { "name": "28549", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/28549" }, { "name": "ADV-2006-4366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "name": "22932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22932" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "21791", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21791" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html" }, { "name": "GLSA-201408-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "name": "26893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26893" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "22509", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22509" }, { "name": "MDKSA-2006:207", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207" }, { "name": "RHSA-2006:0661", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0661.html" }, { "name": "SUSE-SA:2006:061", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "name": "21930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21930" }, { "name": "22940", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22940" }, { "name": "SSRT071304", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "21852", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21852" }, { "name": "BEA07-169.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "name": "21823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21823" }, { "name": "102657", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "name": "22758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22758" }, { "name": "22938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22938" }, { "name": "ADV-2006-3899", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "22044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22044" }, { "name": "ADV-2007-1945", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "OpenPKG-SA-2006.029", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html" }, { "name": "ADV-2006-4206", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "name": "ADV-2006-3730", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "name": "SSRT071299", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "21812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21812" }, { "name": "22523", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22523" }, { "name": "HPSBUX02165", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "22689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22689" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "23794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23794" }, { "name": "SSRT090208", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "102759", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "name": "GLSA-200609-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "name": "22711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22711" }, { "name": "20060905 rPSA-2006-0163-1 openssl openssl-scripts", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "name": "23680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23680" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openvpn.net/changelog.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "name": "[3.9] 20060908 011: SECURITY FIX: September 8, 2006", "tags": [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred" ], "url": "http://www.openbsd.org/errata.html" }, { "name": "22733", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22733" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "22949", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22949" }, { "name": "SSA:2006-310-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "name": "USN-339-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "name": "ADV-2006-3566", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf" }, { "name": "SUSE-SR:2006:026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "name": "102744", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "name": "22446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22446" }, { "name": "22939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22939" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24099" }, { "name": "20060912 ERRATA: [ GLSA 200609-05 ] OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "name": "25284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25284" }, { "name": "22083", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22083" }, { "name": "MDKSA-2006:178", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178" }, { "name": "1016791", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016791" }, { "name": "25649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25649" }, { "name": "ADV-2010-0366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "name": "22671", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22671" }, { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "102722", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "name": "21785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21785" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31492" }, { "name": "ADV-2006-4329", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "name": "DSA-1173", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "name": "38567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38567" }, { "name": "22284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22284" }, { "name": "24930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24930" }, { "name": "ADV-2006-4327", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "name": "MDKSA-2006:161", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161" }, { "name": "21778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21778" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "102696", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "ADV-2007-2163", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "name": "26329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26329" }, { "name": "22260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22260" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html" }, { "name": "ADV-2007-0343", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117" }, { "name": "102656", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "SSRT061213", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "20060901-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "name": "21982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21982" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.attachmate.com/techdocs/2137.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-616" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.attachmate.com/techdocs/2127.html" }, { "name": "GLSA-200610-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "DSA-1174", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1174" }, { "name": "23155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23155" }, { "name": "1000148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html" }, { "name": "22799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22799" }, { "name": "ADV-2006-4207", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "name": "ADV-2006-4417", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "name": "HPSBUX02186", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sybase.com/detail?id=1047991" }, { "name": "SSRT061239", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "21873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21873" }, { "name": "HPSBOV02683", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "RHSA-2007:0072", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "JVNDB-2012-000079", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.serv-u.com/releasenotes/" }, { "name": "ADV-2006-4744", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "name": "38568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38568" }, { "name": "21846", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21846" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "name": "HPSBUX02219", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "ADV-2007-0254", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "name": "SSRT061266", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "22161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22161" }, { "name": "[bind-announce] 20061103 Internet Systems Consortium Security Advisory. [revised]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "name": "22937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22937" }, { "name": "22325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22325" }, { "name": "102648", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "ADV-2007-2315", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "name": "APPLE-SA-2006-11-28", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "21767", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21767" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "22232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22232" }, { "name": "TA06-333A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "21906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21906" }, { "name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "name": "[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22934", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22934" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "22585", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22585" }, { "name": "25399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25399" }, { "name": "ADV-2008-0905", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "name": "ADV-2007-1401", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "name": "201247", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "name": "openssl-rsa-security-bypass(28755)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "name": "22513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22513" }, { "name": "41818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.attachmate.com/techdocs/2128.html" }, { "name": "oval:org.mitre.oval:def:11656", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html" }, { "name": "21776", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21776" }, { "name": "SSRT061275", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "FreeBSD-SA-06:19", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc" }, { "name": "23455", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23455" }, { "name": "20070110 VMware ESX server security updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28115" }, { "name": "22226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22226" }, { "name": "ADV-2006-3936", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22066" }, { "name": "22936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22936" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "HPSBTU02207", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "OpenPKG-SA-2006.018", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html" }, { "name": "MDKSA-2006:177", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177" }, { "name": "22545", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22545" }, { "name": "1017522", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017522" }, { "name": "22948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22948" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL Library", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "name": "23841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23841" }, { "name": "ADV-2006-4205", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "name": "ADV-2007-2783", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "name": "22259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22259" }, { "name": "22036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22036" }, { "name": "200708", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "name": "ADV-2006-4586", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "name": "21927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21927" }, { "name": "SUSE-SA:2006:055", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "name": "ADV-2006-5146", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "name": "21870", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21870" }, { "name": "ADV-2006-4216", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "name": "ADV-2006-3793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "name": "28276", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28276" }, { "name": "21709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21709" }, { "name": "VU#845620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/845620" }, { "name": "SSA:2006-257-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "name": "GLSA-200609-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL library", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "name": "102686", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "name": "24950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24950" }, { "name": "19849", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19849" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "ADV-2006-4750", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SSRT061273", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "ADV-2006-3453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "name": "23915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23915" }, { "name": "201534", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "name": "HPSBMA02250", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "JVN#51615542", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN51615542/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "60799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60799" }, { "name": "28549", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/28549" }, { "name": "ADV-2006-4366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "name": "22932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22932" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "21791", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21791" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html" }, { "name": "GLSA-201408-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "name": "26893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26893" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "22509", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22509" }, { "name": "MDKSA-2006:207", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207" }, { "name": "RHSA-2006:0661", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0661.html" }, { "name": "SUSE-SA:2006:061", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "name": "21930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21930" }, { "name": "22940", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22940" }, { "name": "SSRT071304", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "21852", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21852" }, { "name": "BEA07-169.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "name": "21823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21823" }, { "name": "102657", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "name": "22758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22758" }, { "name": "22938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22938" }, { "name": "ADV-2006-3899", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "22044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22044" }, { "name": "ADV-2007-1945", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "name": "RHSA-2007:0062", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "OpenPKG-SA-2006.029", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html" }, { "name": "ADV-2006-4206", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "name": "ADV-2006-3730", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "name": "SSRT071299", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "21812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21812" }, { "name": "22523", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22523" }, { "name": "HPSBUX02165", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "22689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22689" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "23794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23794" }, { "name": "SSRT090208", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "102759", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "name": "GLSA-200609-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "name": "22711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22711" }, { "name": "20060905 rPSA-2006-0163-1 openssl openssl-scripts", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "name": "23680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23680" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openvpn.net/changelog.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "name": "[3.9] 20060908 011: SECURITY FIX: September 8, 2006", "tags": [ "vendor-advisory", "x_refsource_OPENBSD" ], "url": "http://www.openbsd.org/errata.html" }, { "name": "22733", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22733" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "22949", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22949" }, { "name": "SSA:2006-310-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "name": "USN-339-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "name": "ADV-2006-3566", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf" }, { "name": "SUSE-SR:2006:026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "name": "102744", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "name": "22446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22446" }, { "name": "22939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22939" }, { "name": "24099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24099" }, { "name": "20060912 ERRATA: [ GLSA 200609-05 ] OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "name": "25284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25284" }, { "name": "22083", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22083" }, { "name": "MDKSA-2006:178", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178" }, { "name": "1016791", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016791" }, { "name": "25649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25649" }, { "name": "ADV-2010-0366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "name": "22671", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22671" }, { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "102722", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "name": "21785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21785" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31492" }, { "name": "ADV-2006-4329", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "name": "DSA-1173", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "name": "38567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38567" }, { "name": "22284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22284" }, { "name": "24930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24930" }, { "name": "ADV-2006-4327", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "name": "MDKSA-2006:161", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161" }, { "name": "21778", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21778" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "102696", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "name": "APPLE-SA-2007-12-14", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "ADV-2007-2163", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "name": "26329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26329" }, { "name": "22260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22260" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html" }, { "name": "ADV-2007-0343", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117" }, { "name": "102656", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "name": "SUSE-SA:2007:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "SSRT061213", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "20060901-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "name": "21982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21982" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.attachmate.com/techdocs/2137.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-616" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.attachmate.com/techdocs/2127.html" }, { "name": "GLSA-200610-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "DSA-1174", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1174" }, { "name": "23155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23155" }, { "name": "1000148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html" }, { "name": "22799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22799" }, { "name": "ADV-2006-4207", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "name": "ADV-2006-4417", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "name": "HPSBUX02186", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sybase.com/detail?id=1047991" }, { "name": "SSRT061239", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "21873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21873" }, { "name": "HPSBOV02683", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "RHSA-2007:0072", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "JVNDB-2012-000079", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.serv-u.com/releasenotes/" }, { "name": "ADV-2006-4744", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "name": "38568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38568" }, { "name": "21846", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21846" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "name": "HPSBUX02219", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "ADV-2007-0254", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "name": "SSRT061266", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "ADV-2007-4224", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "22161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22161" }, { "name": "[bind-announce] 20061103 Internet Systems Consortium Security Advisory. [revised]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "name": "22937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22937" }, { "name": "22325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22325" }, { "name": "102648", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "ADV-2007-2315", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "name": "APPLE-SA-2006-11-28", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "21767", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21767" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "22232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22232" }, { "name": "TA06-333A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "21906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21906" }, { "name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "name": "[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22934", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22934" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "name": "RHSA-2007:0073", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "22585", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22585" }, { "name": "25399", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25399" }, { "name": "ADV-2008-0905", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "name": "ADV-2007-1401", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "name": "201247", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "name": "openssl-rsa-security-bypass(28755)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "name": "22513", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22513" }, { "name": "41818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.attachmate.com/techdocs/2128.html" }, { "name": "oval:org.mitre.oval:def:11656", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html" }, { "name": "21776", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21776" }, { "name": "SSRT061275", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "FreeBSD-SA-06:19", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc" }, { "name": "23455", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23455" }, { "name": "20070110 VMware ESX server security updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "name": "28115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28115" }, { "name": "22226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22226" }, { "name": "ADV-2006-3936", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22066" }, { "name": "22936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22936" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "HPSBTU02207", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "OpenPKG-SA-2006.018", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html" }, { "name": "MDKSA-2006:177", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177" }, { "name": "22545", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22545" }, { "name": "1017522", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017522" }, { "name": "22948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22948" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL Library", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "name": "23841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23841" }, { "name": "ADV-2006-4205", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "name": "ADV-2007-2783", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "name": "22259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22259" }, { "name": "22036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22036" }, { "name": "200708", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "name": "ADV-2006-4586", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "name": "21927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21927" }, { "name": "SUSE-SA:2006:055", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "name": "ADV-2006-5146", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "name": "21870", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21870" }, { "name": "ADV-2006-4216", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "name": "ADV-2006-3793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "name": "28276", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28276" }, { "name": "21709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21709" }, { "name": "VU#845620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/845620" }, { "name": "SSA:2006-257-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "name": "GLSA-200609-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL library", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "name": "102686", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "name": "24950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24950" }, { "name": "19849", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19849" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-4339", "datePublished": "2006-09-05T17:00:00", "dateReserved": "2006-08-24T00:00:00", "dateUpdated": "2024-08-07T19:06:07.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-4339\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2006-09-05T17:04:00.000\",\"lastModified\":\"2024-11-21T00:15:42.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.\"},{\"lang\":\"es\",\"value\":\"OpenSSL en versiones anteriores a 0.9.7, 0.9.7 en versiones anteriores a 0.9.7k y 0.9.8 en versiones anteriores a 0.9.8c, cuando usa una clave RSA con exponente 3, elimina relleno PKCS-1 antes de generar un hash, lo que permite a atacantes remotos falsificar una firma PKCS #1 v1.5 que est\u00e1 firmada por dicha clave RSA e impide a OpenSSL verificar correctamente los certificados X.509 y otros que utilizan PKCS #1.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.7\",\"matchCriteriaId\":\"118A4D99-B8CC-4276-BB72-4C384B16585D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D983EC-61B0-4FD9-89B5-9878E4CE4405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4C5F05-BC0B-478D-9A6F-7C804777BA41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F417A1-5D97-4BC4-8B97-5AC40236DA21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDB5A09-BE86-4352-9799-A875649EDB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6231CAA-00A8-41CE-8436-B84518014CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70AD93B-E876-4EAB-9970-752D42E15E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F03FA9C0-24C7-46AC-92EC-7834BC34C79B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"716ADA01-38B8-4C15-A3BB-D9688DA30599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73326F7-7DCE-4EDE-95D7-AE7AED263A14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E4742C-A983-4F00-B24F-AB280C0E876D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2D251C-9C45-4EFE-8262-E88AB7CE713A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D81E175-E698-40EF-9601-425893FFB1FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0F25B7-A172-4300-8718-112E817A6165\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0628DF-3A4C-4078-B615-22260671EABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B1BE89-BAE0-4656-943B-B9B81D9B54B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D097222B-ED20-459C-9167-55751FA2C87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DDC8F2-7920-4A73-927E-562C89806972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962FCB86-15AD-4399-8B7D-EC1DEA919C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180D07AE-C571-4DD6-837C-43E2A946007A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90789533-C741-4B1C-A24B-2C77B9E4DE5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1520065B-46D7-48A4-B9D0-5B49F690C5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA526B9-726A-49D5-B3CA-EBE2DA303CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494E48E7-EF86-4860-9A53-94F6C313746E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2636B92E-47D5-42EA-9585-A2B84FBE71CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E79A05-64F3-4397-952C-A5BB950C967D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549BB01D-F322-4FE3-BDA2-4FEA8ED8568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98693865-2E79-4BD6-9F89-1994BC9A3E73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6476506-EC37-4726-82DC-D0E8254A8CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6ECEF7-CB16-4604-894B-6EB19F1CEF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C81EF3D-4DB7-4799-9670-8D79E28CA184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8116A66-175C-4E6D-9A9B-D54C1D97D213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"382C1679-DA1D-4FA4-9D5E-B86CC5052D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://dev2dev.bea.com/pub/advisory/238\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=304829\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307177\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://jvn.jp/en/jp/JVN51615542/index.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openvpn.net/changelog.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21709\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21767\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21776\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21778\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21785\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21791\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21812\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21823\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21846\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21852\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21870\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21873\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21906\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21927\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21930\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21982\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22036\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22161\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22226\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22232\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22259\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22260\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22284\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22325\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22446\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22509\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22513\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22523\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22545\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22585\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22671\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22689\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22733\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22758\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22799\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22932\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22934\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22936\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22937\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22938\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22939\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22940\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22948\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22949\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23155\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23455\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23841\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24099\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24930\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24950\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25284\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25399\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25649\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26329\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26893\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28115\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38568\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/41818\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60799\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200609-05.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200609-18.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016791\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1017522\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.attachmate.com/techdocs/2127.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.attachmate.com/techdocs/2128.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.attachmate.com/techdocs/2137.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1174\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/845620\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:161\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:177\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:178\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_26_sr.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_55_ssl.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_61_opera.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openbsd.org/errata.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2006-4339.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openssl.org/news/secadv_20060905.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/support/search/supsearch.dml?index=845\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/28549\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0661.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0062.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0072.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0073.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/445231/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/445822/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/450327/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/450327/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/456546/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/489739/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/19849\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/22083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/28276\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.serv-u.com/releasenotes/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.sybase.com/detail?id=1047991\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-339-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-333A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us.debian.org/security/2006/dsa-1173\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/player/doc/releasenotes_player.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/player2/doc/releasenotes_player2.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/server/doc/releasenotes_server.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3453\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3566\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3730\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3793\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3899\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3936\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4205\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4206\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4216\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4327\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4329\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4366\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4417\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4586\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4744\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4750\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/5146\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0254\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0343\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1401\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1815\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1945\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2163\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2315\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2783\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/4224\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0905/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0366\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28755\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1633\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-616\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://dev2dev.bea.com/pub/advisory/238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=304829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvn.jp/en/jp/JVN51615542/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openvpn.net/changelog.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21812\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21846\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22509\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22513\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22523\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22585\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22689\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22934\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22949\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23455\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24099\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25649\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26329\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/41818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200609-05.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200609-18.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.attachmate.com/techdocs/2127.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.attachmate.com/techdocs/2128.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.attachmate.com/techdocs/2137.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/845620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_26_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_55_ssl.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_61_opera.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openbsd.org/errata.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2006-4339.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssl.org/news/secadv_20060905.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/support/search/supsearch.dml?index=845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/28549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0661.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/445231/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/445822/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/450327/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/450327/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/456546/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/489739/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/22083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.serv-u.com/releasenotes/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.sybase.com/detail?id=1047991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-339-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-333A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us.debian.org/security/2006/dsa-1173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/player/doc/releasenotes_player.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/player2/doc/releasenotes_player2.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/server/doc/releasenotes_server.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3899\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4205\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4206\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4327\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4329\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/5146\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/4224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0905/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Vulnerable. This issue affects OpenSSL and OpenSSL compatibility packages in Red Hat Enterprise Linux 2.1, 3, and 4. Updates, along with our advisory are available at the URL below.\\nhttp://rhn.redhat.com/errata/RHSA-2006-0661.html\\n\\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
var-200110-0192
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0192", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sun microsystems", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6k" }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "openssl", "scope": "eq", "trust": 0.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andy Davis advisories@irmplc.com\u203bVicente Aguilera Diaz vaguilera@isecauditors.com Esteban Martinez FayoTony FogartyOliver Karow Oliver.karow@gmx.de Joxean Koret joxeankoret@yahoo.es\u203bAlexander Kornbrust ak@red-database-security.com David Litchfield", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#594904", "trust": 0.8, "value": "0.63" }, { "author": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 1.9 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 1.1 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "38567", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "SECTRACK", "id": "1017143", "trust": 0.8 }, { "db": "SECUNIA", "id": "22646", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200110-0192", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-07-23T21:57:58.746000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOo_3.2.1_Win_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3189" }, { "title": "OOo_3.2.0_Linux_x86-64_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3193" }, { "title": "OOo_3.2.0_Linux_x86-64_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3192" }, { "title": "OOo_3.2.1_Linux_x86_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3191" }, { "title": "OOo_3.2.0_Solaris_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3195" }, { "title": "OOo_3.2.1_Linux_x86_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3190" }, { "title": "OOo_3.2.0_MacOS_x86_install_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3194" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.1, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://www.sun.com/software/products/appsrvr/index.xml" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=438cfb75" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=43a84f89" }, { "trust": 0.8, "url": "http://www.mozilla.org/projects/security/pki/nss/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102670-1 " }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/ssl" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2006/4299 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1017143 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22646 " }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-09T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 } }
var-200110-0185
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDKSA-2006:207 http://www.mandriva.com/security/
Package : bind Date : November 14, 2006 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0
Problem Description:
The BIND DNS server is vulnerable to the recently-discovered OpenSSL RSA signature verification problem (CVE-2006-4339). BIND uses RSA cryptography as part of its DNSSEC implementation. As a result, to resolve the security issue, these packages need to be upgraded and for both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to be generated using the "-e" option of dnssec-keygen, if the current keys were generated using the default exponent of 3.
You are able to determine if your keys are vulnerable by looking at the algorithm (1 or 5) and the first three characters of the Base64 encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with "AQM", "AQN", "AQO", or "AQP" are vulnerable.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445
Updated Packages:
Mandriva Linux 2006.0: 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2007.0: 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64: c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Corporate 3.0: fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 3.0/X86_64: e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 4.0: 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Multi Network Firewall 2.0: abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z 6faoicEmIFqGW4QuEVIhCbU= =bI0u -----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: OpenOffice.org 2 Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA38567
VERIFY ADVISORY: http://secunia.com/advisories/38567/
DESCRIPTION: Some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system.
For more information: SA38568
SOLUTION: Upgrade to version 3.2.
ORIGINAL ADVISORY: http://www.openoffice.org/security/cves/CVE-2006-4339.html http://www.openoffice.org/security/cves/CVE-2009-0217.html http://www.openoffice.org/security/cves/CVE-2009-2949.html http://www.openoffice.org/security/cves/CVE-2009-2950.html http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html
OTHER REFERENCES: SA38568: http://secunia.com/advisories/38568/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0185", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher reported this issue to the vendor.", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n \n Mandriva Linux Security Advisory MDKSA-2006:207\n http://www.mandriva.com/security/\n _______________________________________________________________________\n \n Package : bind\n Date : November 14, 2006\n Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\n _______________________________________________________________________\n \n Problem Description:\n \n The BIND DNS server is vulnerable to the recently-discovered OpenSSL\n RSA signature verification problem (CVE-2006-4339). BIND uses RSA\n cryptography as part of its DNSSEC implementation. As a result, to\n resolve the security issue, these packages need to be upgraded and for\n both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to\n be generated using the \"-e\" option of dnssec-keygen, if the current\n keys were generated using the default exponent of 3. \n\n You are able to determine if your keys are vulnerable by looking at the\n algorithm (1 or 5) and the first three characters of the Base64 encoded\n RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with \"AQM\", \"AQN\",\n \"AQO\", or \"AQP\" are vulnerable. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\n http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm\n 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm\n f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm\n fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm\n f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2007.0:\n 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm\n 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm\n 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Mandriva Linux 2007.0/X86_64:\n c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm\n 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm\n e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Corporate 3.0:\n fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm\n 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm\n 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm\n b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm\n ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm\n dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm\n daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm\n c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm\n 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm\n dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm\n 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm \n eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.2.2 (GNU/Linux)\n\niD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z\n6faoicEmIFqGW4QuEVIhCbU=\n=bI0u\n-----END PGP SIGNATURE-----\n\n. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nOpenOffice.org 2 Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA38567\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38567/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in OpenOffice.org, which can\nbe exploited by malicious people to bypass certain security\nrestrictions, conduct spoofing attacks, or compromise a user\u0027s\nsystem. \n\nFor more information:\nSA38568\n\nSOLUTION:\nUpgrade to version 3.2. \n\nORIGINAL ADVISORY:\nhttp://www.openoffice.org/security/cves/CVE-2006-4339.html\nhttp://www.openoffice.org/security/cves/CVE-2009-0217.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2949.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2950.html\nhttp://www.openoffice.org/security/cves/CVE-2009-3301-3302.html\n\nOTHER REFERENCES:\nSA38568:\nhttp://secunia.com/advisories/38568/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 1.5 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "SECUNIA", "id": "38567", "trust": 1.2 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "52186", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86234", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200110-0185", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-06-08T22:21:36.650000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.1, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.4, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-0217.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38568/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-3301-3302.html" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2950.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2949.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38567/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2006-11-16T16:32:32", "db": "PACKETSTORM", "id": "52186" }, { "date": "2010-02-12T13:01:15", "db": "PACKETSTORM", "id": "86234" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 } }
var-200609-0995
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
~ VMware Security Advisory
Advisory ID: VMSA-2008-0005 Synopsis: Updated VMware Workstation, VMware Player, VMware ~ Server, VMware ACE, and VMware Fusion resolve ~ critical security issues Issue date: 2008-03-17 Updated on: 2008-03-17 (initial release of advisory) CVE numbers: CVE-2008-0923 CVE-2008-0923 CVE-2008-1361 ~ CVE-2008-1362 CVE-2007-5269 CVE-2006-2940 ~ CVE-2006-2937 CVE-2006-4343 CVE-2006-4339 ~ CVE-2007-5618 CVE-2008-1364 CVE-2008-1363 ~ CVE-2008-1340
- Summary:
~ Several critical security vulnerabilities have been addressed ~ in the newest releases of VMware's hosted product line.
- Relevant releases:
~ VMware Workstation 6.0.2 and earlier ~ VMware Workstation 5.5.4 and earlier ~ VMware Player 2.0.2 and earlier ~ VMware Player 1.0.4 and earlier ~ VMware ACE 2.0.2 and earlier ~ VMware ACE 1.0.2 and earlier ~ VMware Server 1.0.4 and earlier ~ VMware Fusion 1.1 and earlier
- Problem description:
~ a. Host to guest shared folder (HGFS) traversal vulnerability
~ On Windows hosts, if you have configured a VMware host to guest ~ shared folder (HGFS), it is possible for a program running in the ~ guest to gain access to the host's file system and create or modify ~ executable files in sensitive locations.
NOTE: VMware Server is not affected because it doesn't use host to ~ guest shared folders. Because ~ ESX Server is based on a bare-metal hypervisor architecture ~ and not a hosted architecture, and it doesn't include any ~ shared folder abilities. Fusion and Linux based hosted ~ products are unaffected.
~ VMware would like to thank CORE Security Technologies for ~ working with us on this issue. This addresses advisory ~ CORE-2007-0930.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2008-0923 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ b. Insecure named pipes
~ An internal security audit determined that a malicious Windows ~ user could attain and exploit LocalSystem privileges by causing ~ the authd process to connect to a named pipe that is opened and ~ controlled by the malicious user.
~ The same internal security audit determined that a malicious ~ Windows user could exploit an insecurely created named pipe ~ object to escalate privileges or create a denial of service ~ attack. In this situation, the malicious user could ~ successfully impersonate authd and attain privileges under ~ which Authd is executing.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the names CVE-2008-1361, CVE-2008-1362 to these ~ issues.
~ Windows Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ c. Updated libpng library to version 1.2.22 to address various ~ security vulnerabilities
~ Several flaws were discovered in the way libpng handled various PNG ~ image chunks. An attacker could create a carefully crafted PNG ~ image file in such a way that it could cause an application linked ~ with libpng to crash when the file was manipulated.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2007-5269 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion is not affected by this issue.
~ d.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the following names to these issues: CVE-2006-2940, ~ CVE-2006-2937, CVE-2006-4343, CVE-2006-4339.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion is not affected by this issue.
~ e. VIX API default setting changed to a more secure default value
~ Workstation 6.0.2 allowed anonymous console access to the guest by ~ means of the VIX API. This release, Workstation 6.0.3, disables ~ this feature. This means that the Eclipse Integrated Virtual ~ Debugger and the Visual Studio Integrated Virtual Debugger will now ~ prompt for user account credentials to access a guest.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)
~ f. Windows 2000 based hosted products privilege escalation ~ vulnerability
~ This release addresses a potential privilege escalation on ~ Windows 2000 hosted products. Certain services may be improperly ~ registered and present a security vulnerability to Windows 2000 ~ machines.
~ VMware would like to thank Ray Hicken for reporting this issue and ~ David Maciejak for originally pointing out these types of ~ vulnerabilities.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2007-5618 to this issue.
~ Windows versions of Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion and Linux based products are not affected by this ~ issue.
~ g. DHCP denial of service vulnerability
~ A potential denial of service issue affects DHCP service running ~ on the host.
~ VMware would like to thank Martin O'Neal for reporting this issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1364 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ VMware Fusion 1.1 upgrade to version 1.1.1 (Build# 72241)
~ NOTE: This issue doesn't affect the latest versions of VMware ~ Workstation 6, VMware Player 2, and ACE 2 products.
~ h. Local Privilege Escalation on Windows based platforms by ~ Hijacking VMware VMX configuration file
~ VMware uses a configuration file named "config.ini" which ~ is located in the application data directory of all users. ~ By manipulating this file, a user could gain elevated ~ privileges by hijacking the VMware VMX process.
~ VMware would like to thank Sun Bing for reporting the issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1363 to this issue.
~ Windows based Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ i. Virtual Machine Communication Interface (VMCI) memory corruption ~ resulting in denial of service
~ VMCI was introduced in VMware Workstation 6.0, VMware Player 2.0, ~ and VMware ACE 2.0. It is an experimental, optional feature and ~ it may be possible to crash the host system by making specially ~ crafted calls to the VMCI interface. This may result in denial ~ of service via memory exhaustion and memory corruption.
~ VMware would like to thank Andrew Honig of the Department of ~ Defense for reporting this issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1340 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)
- Solution:
Please review the Patch notes for your product and version and verify the md5sum of your downloaded file.
~ VMware Workstation 6.0.3 ~ ------------------------ ~ http://www.vmware.com/download/ws/ ~ Release notes: ~ http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html ~ Windows binary ~ md5sum: 323f054957066fae07735160b73b91e5 ~ RPM Installation file for 32-bit Linux ~ md5sum: c44183ad11082f05593359efd220944e ~ tar Installation file for 32-bit Linux ~ md5sum: 57601f238106cb12c1dea303ad1b4820 ~ RPM Installation file for 64-bit Linux ~ md5sum: e9ba644be4e39556724fa2901c5e94e9 ~ tar Installation file for 64-bit Linux ~ md5sum: d8d423a76f99a94f598077d41685e9a9
~ VMware Workstation 5.5.5 ~ ------------------------ ~ http://www.vmware.com/download/ws/ws5.html ~ Release notes: ~ http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html ~ Windows binary ~ md5sum: 9c2dd94db5eed93d7f64e8d6ba8d8bd3 ~ Compressed Tar archive for 32-bit Linux ~ md5sum: 77401c0842a151f0b2db0b4fcb0d16eb ~ Linux RPM version for 32-bit Linux ~ md5sum: c222b6db934deb9c1bb79b16b25a3202
~ VMware Server 1.0.5 ~ ------------------- ~ http://www.vmware.com/download/server/ ~ Release notes: ~ http://www.vmware.com/support/server/doc/releasenotes_server.html ~ VMware Server for Windows 32-bit and 64-bit ~ md5sum: 3c4a57310c55e17bf8e4a1059d5b36cc ~ VMware Server Windows client package ~ md5sum: cb3dd2439203dc510f4d95f06ba59d21 ~ VMware Server for Linux ~ md5sum: 161dcbe5af9bbd9834a86bf7c599903e ~ VMware Server for Linux rpm ~ md5sum: fc3b81ed18b53eda943a992971e9f84a ~ Management Interface ~ md5sum: dd10d25895d9994bd27ca896152f48ef ~ VMware Server Linux client package ~ md5sum: aae18f1f7b8811b5499e3a358754d4f8
~ VMware ACE 2.0.3 and 1.0.5 ~ -------------------------- ~ http://www.vmware.com/download/ace/ ~ Windows Release notes: ~ http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
~ VMware Fusion 1.1.1 ~ ------------------- ~ http://www.vmware.com/download/fusion/ ~ Release notes: ~ http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html ~ md5sum: 38e116ec26b30e7a6ac47c249ef650d0
~ VMware Player 2.0.3 and 1.0.6 ~ ---------------------- ~ http://www.vmware.com/download/player/ ~ Release notes Player 1.x: ~ http://www.vmware.com/support/player/doc/releasenotes_player.html ~ Release notes Player 2.0 ~ http://www.vmware.com/support/player2/doc/releasenotes_player2.html ~ 2.0.3 Windows binary ~ md5sum: 0c5009d3b569687ae139e13d24c868d3 ~ VMware Player 2.0.3 for Linux (.rpm) ~ md5sum: 53502b2112a863356dcd13dd0d8dd8f2 ~ VMware Player 2.0.3 for Linux (.tar) ~ md5sum: 2305fcff49bef6e4ad83742412eac978 ~ VMware Player 2.0.3 - 64-bit (.rpm) ~ md5sum: cf945b571c4d96146ede010286fdfca5 ~ VMware Player 2.0.3 - 64-bit (.tar) ~ md5sum: f99c5b293eb87c5f918ad24111565b9f ~ 1.0.6 Windows binary ~ md5sum: 895081406c4de5361a1700ec0473e49c ~ Player 1.0.6 for Linux (.rpm) ~ md5sum: 8adb23799dd2014be0b6d77243c76942 ~ Player 1.0.6 for Linux (.tar) ~ md5sum: c358f8e1387fb60863077d6f8a9f7b3f
- References:
~ CVE numbers ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1361 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1362 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5618 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1364 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1363 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1340
- Contact:
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
~ * security-announce@lists.vmware.com ~ * bugtraq@securityfocus.com ~ * full-disclosure@lists.grok.org.uk
E-mail: security@vmware.com
Security web site http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFH3yTxS2KysvBH1xkRCHq8AJ0QOMocv/gSz/hgdojA39PGVO6pUACePCRv Cv8MnL2bYPyDfYQ3f4IUL+w= =tFXS -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: OpenOffice.org 3 Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA38568
VERIFY ADVISORY: http://secunia.com/advisories/38568/
DESCRIPTION: Some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system.
1) The included libxml2 library fails to properly verify signatures.
This is related to: SA21709
2) An error in the included libxmlsec library can be exploited to potentially forge a valid signature.
For more information: SA35854
3) An error in the included MSVC Runtime package can be exploited to bypass certain security features.
For more information see vulnerability #2 in: SA35967
4) An error in the processing XPM files can be exploited to potentially execute arbitrary code.
5) An error in the processing GIF files can be exploited to potentially execute arbitrary code.
6) An error in the processing of Word documents can be exploited to potentially execute arbitrary code.
SOLUTION: Update to version 3.2.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 4) Sebastian Apelt of siberas 5) Frank Rei\xdfner and Sebastian Apelt of siberas 6) Nicolas Joly of Vupen
ORIGINAL ADVISORY: http://www.openoffice.org/security/cves/CVE-2006-4339.html http://www.openoffice.org/security/cves/CVE-2009-0217.html http://www.openoffice.org/security/cves/CVE-2009-2493.html http://www.openoffice.org/security/cves/CVE-2009-2949.html http://www.openoffice.org/security/cves/CVE-2009-2950.html http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html
OTHER REFERENCES: SA21709: http://secunia.com/advisories/21709/
SA35854: http://secunia.com/advisories/35854/
SA35967: http://secunia.com/advisories/35967/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00794048 Version: 1
HPSBUX02165 SSRT061266 rev.1 - HP-UX VirtualVault Remote Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2006-10-31 Last Updated: 2006-10-31
Potential Security Impact: Remote Unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A security vulnerability has been identified in OpenSSL used in HP VirtualVault 4.7, 4.6, 4.5 and HP WebProxy that may allow remote unauthorized access.
References: CVE-2006-4339
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.04 running Virtualvault 4.7 or Virtualvault 4.6 or Virtualvault 4.5 or HP WebProxy.
BACKGROUND
The OpenSSL community has released OpenSSL 0.9.7.k version superseding the OpenSSL 0.9.7i release that was identified in the CVE report.
Note: To determine if a system has an affected version, search the output of "swlist -a revision -l fileset" for an affected fileset. Then determine if the recommended patch or update is installed.
AFFECTED VERSIONS
HP-UX B.11.04 Virtualvault A.04.70
VaultWS.WS-CORE VaultTS.VV-IWS VaultTS.VV-CORE-CMN VaultTGP.TGP-CORE action: install PHSS_35463, PHSS_35460, PHSS_35481 or subsequent
HP-UX B.11.04 Virtualvault A.04.70 (Apache 2.X)
VaultWS.WS-CORE action: install PHSS_35436 or subsequent
HP-UX B.11.04 Virtualvault A.04.60
VaultWS.WS-CORE VaultTS.VV-IWS VaultTS.VV-CORE-CMN VaultTGP.TGP-CORE action: install PHSS_35462, PHSS_35459, PHSS_35480 or subsequent
HP-UX B.11.04 Virtualvault A.04.50
VaultWS.WS-CORE VaultTS.VV-IWS VaultTS.VV-IWS-JK VaultTS.VV-CORE-CMN action: install PHSS_35461, PHSS_35458 or subsequent
HP-UX B.11.04 HP Webproxy A.02.10 (Apache 2.x)
HP_Webproxy.HPWEB-PX-CORE action: install PHSS_35437 or subsequent
HP-UX B.11.04 HP Webproxy A.02.10 (Apache 1.x)
HP_Webproxy.HPWEB-PX-CORE action: install PHSS_35111 or subsequent
HP-UX B.11.04 HP Webproxy A.02.00
HP_Webproxy.HPWEB-PX-CORE action: install PHSS_35110 or subsequent
END AFFECTED VERSIONS
RESOLUTION
HP is making the following patches available to resolve this issue. The patches are available for download from http://itrc.hp.com
For B.11.04 HP has made the following patches available: PHSS_35463 Virtualvault 4.7 OWS (Apache 1.x) update PHSS_35460 Virtualvault 4.7 IWS update PHSS_35481 Virtualvault 4.7 TGP update PHSS_35436 Virtualvault 4.7 OWS (Apache 2.x) update PHSS_35462 Virtualvault 4.6 OWS update PHSS_35459 Virtualvault 4.6 IWS update PHSS_35480 Virtualvault 4.6 TGP update PHSS_35461 Virtualvault 4.5 OWS update PHSS_35458 Virtualvault 4.5 IWS update PHSS_35437 Webproxy server 2.1 (Apache 2.x) update PHSS_35111 Webproxy server 2.1 (Apache 1.x) update PHSS_35110 Webproxy server 2.0 update
PRODUCT SPECIFIC INFORMATION HP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA
MANUAL ACTIONS: No
HISTORY Version: 1 (rev.1) 31 October 2006 Initial release
Third Party Security Patches: Third Party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com. It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA& langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
-
The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW, MA = HP Management Agents, MI = Misc. 3rd party SW, MP = HP MPE/iX, NS = HP NonStop Servers, OV = HP OpenVMS, PI = HP Printing & Imaging, ST = HP Storage SW, TL = HP Trusted Linux, TU = HP Tru64 UNIX, UX = HP-UX, VV = HP Virtual Vault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
(c)Copyright 2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0995", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher reported this issue to the vendor.", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- -------------------------------------------------------------------\n~ VMware Security Advisory\n\nAdvisory ID: VMSA-2008-0005\nSynopsis: Updated VMware Workstation, VMware Player, VMware\n~ Server, VMware ACE, and VMware Fusion resolve\n~ critical security issues\nIssue date: 2008-03-17\nUpdated on: 2008-03-17 (initial release of advisory)\nCVE numbers: CVE-2008-0923 CVE-2008-0923 CVE-2008-1361\n~ CVE-2008-1362 CVE-2007-5269 CVE-2006-2940\n~ CVE-2006-2937 CVE-2006-4343 CVE-2006-4339\n~ CVE-2007-5618 CVE-2008-1364 CVE-2008-1363\n~ CVE-2008-1340\n- -------------------------------------------------------------------\n\n1. Summary:\n\n~ Several critical security vulnerabilities have been addressed\n~ in the newest releases of VMware\u0027s hosted product line. \n\n2. Relevant releases:\n\n~ VMware Workstation 6.0.2 and earlier\n~ VMware Workstation 5.5.4 and earlier\n~ VMware Player 2.0.2 and earlier\n~ VMware Player 1.0.4 and earlier\n~ VMware ACE 2.0.2 and earlier\n~ VMware ACE 1.0.2 and earlier\n~ VMware Server 1.0.4 and earlier\n~ VMware Fusion 1.1 and earlier\n\n3. Problem description:\n\n~ a. Host to guest shared folder (HGFS) traversal vulnerability\n\n~ On Windows hosts, if you have configured a VMware host to guest\n~ shared folder (HGFS), it is possible for a program running in the\n~ guest to gain access to the host\u0027s file system and create or modify\n~ executable files in sensitive locations. \n\nNOTE: VMware Server is not affected because it doesn\u0027t use host to\n~ guest shared folders. Because\n~ ESX Server is based on a bare-metal hypervisor architecture\n~ and not a hosted architecture, and it doesn\u0027t include any\n~ shared folder abilities. Fusion and Linux based hosted\n~ products are unaffected. \n\n~ VMware would like to thank CORE Security Technologies for\n~ working with us on this issue. This addresses advisory\n~ CORE-2007-0930. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the name CVE-2008-0923 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ b. Insecure named pipes\n\n~ An internal security audit determined that a malicious Windows\n~ user could attain and exploit LocalSystem privileges by causing\n~ the authd process to connect to a named pipe that is opened and\n~ controlled by the malicious user. \n\n~ The same internal security audit determined that a malicious\n~ Windows user could exploit an insecurely created named pipe\n~ object to escalate privileges or create a denial of service\n~ attack. In this situation, the malicious user could\n~ successfully impersonate authd and attain privileges under\n~ which Authd is executing. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the names CVE-2008-1361, CVE-2008-1362 to these\n~ issues. \n\n~ Windows Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ c. Updated libpng library to version 1.2.22 to address various\n~ security vulnerabilities\n\n~ Several flaws were discovered in the way libpng handled various PNG\n~ image chunks. An attacker could create a carefully crafted PNG\n~ image file in such a way that it could cause an application linked\n~ with libpng to crash when the file was manipulated. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the name CVE-2007-5269 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion is not affected by this issue. \n\n~ d. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the following names to these issues: CVE-2006-2940,\n~ CVE-2006-2937, CVE-2006-4343, CVE-2006-4339. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion is not affected by this issue. \n\n~ e. VIX API default setting changed to a more secure default value\n\n~ Workstation 6.0.2 allowed anonymous console access to the guest by\n~ means of the VIX API. This release, Workstation 6.0.3, disables\n~ this feature. This means that the Eclipse Integrated Virtual\n~ Debugger and the Visual Studio Integrated Virtual Debugger will now\n~ prompt for user account credentials to access a guest. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n\n~ f. Windows 2000 based hosted products privilege escalation\n~ vulnerability\n\n~ This release addresses a potential privilege escalation on\n~ Windows 2000 hosted products. Certain services may be improperly\n~ registered and present a security vulnerability to Windows 2000\n~ machines. \n\n~ VMware would like to thank Ray Hicken for reporting this issue and\n~ David Maciejak for originally pointing out these types of\n~ vulnerabilities. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2007-5618 to this issue. \n\n~ Windows versions of Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion and Linux based products are not affected by this\n~ issue. \n\n~ g. DHCP denial of service vulnerability\n\n~ A potential denial of service issue affects DHCP service running\n~ on the host. \n\n~ VMware would like to thank Martin O\u0027Neal for reporting this issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1364 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n~ VMware Fusion 1.1 upgrade to version 1.1.1 (Build# 72241)\n\n~ NOTE: This issue doesn\u0027t affect the latest versions of VMware\n~ Workstation 6, VMware Player 2, and ACE 2 products. \n\n~ h. Local Privilege Escalation on Windows based platforms by\n~ Hijacking VMware VMX configuration file\n\n~ VMware uses a configuration file named \"config.ini\" which\n~ is located in the application data directory of all users. \n~ By manipulating this file, a user could gain elevated\n~ privileges by hijacking the VMware VMX process. \n\n~ VMware would like to thank Sun Bing for reporting the issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1363 to this issue. \n\n~ Windows based Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ i. Virtual Machine Communication Interface (VMCI) memory corruption\n~ resulting in denial of service\n\n~ VMCI was introduced in VMware Workstation 6.0, VMware Player 2.0,\n~ and VMware ACE 2.0. It is an experimental, optional feature and\n~ it may be possible to crash the host system by making specially\n~ crafted calls to the VMCI interface. This may result in denial\n~ of service via memory exhaustion and memory corruption. \n\n~ VMware would like to thank Andrew Honig of the Department of\n~ Defense for reporting this issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1340 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n\n4. Solution:\n\nPlease review the Patch notes for your product and version and verify\nthe md5sum of your downloaded file. \n\n~ VMware Workstation 6.0.3\n~ ------------------------\n~ http://www.vmware.com/download/ws/\n~ Release notes:\n~ http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\n~ Windows binary\n~ md5sum: 323f054957066fae07735160b73b91e5\n~ RPM Installation file for 32-bit Linux\n~ md5sum: c44183ad11082f05593359efd220944e\n~ tar Installation file for 32-bit Linux\n~ md5sum: 57601f238106cb12c1dea303ad1b4820\n~ RPM Installation file for 64-bit Linux\n~ md5sum: e9ba644be4e39556724fa2901c5e94e9\n~ tar Installation file for 64-bit Linux\n~ md5sum: d8d423a76f99a94f598077d41685e9a9\n\n~ VMware Workstation 5.5.5\n~ ------------------------\n~ http://www.vmware.com/download/ws/ws5.html\n~ Release notes:\n~ http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\n~ Windows binary\n~ md5sum: 9c2dd94db5eed93d7f64e8d6ba8d8bd3\n~ Compressed Tar archive for 32-bit Linux\n~ md5sum: 77401c0842a151f0b2db0b4fcb0d16eb\n~ Linux RPM version for 32-bit Linux\n~ md5sum: c222b6db934deb9c1bb79b16b25a3202\n\n~ VMware Server 1.0.5\n~ -------------------\n~ http://www.vmware.com/download/server/\n~ Release notes:\n~ http://www.vmware.com/support/server/doc/releasenotes_server.html\n~ VMware Server for Windows 32-bit and 64-bit\n~ md5sum: 3c4a57310c55e17bf8e4a1059d5b36cc\n~ VMware Server Windows client package\n~ md5sum: cb3dd2439203dc510f4d95f06ba59d21\n~ VMware Server for Linux\n~ md5sum: 161dcbe5af9bbd9834a86bf7c599903e\n~ VMware Server for Linux rpm\n~ md5sum: fc3b81ed18b53eda943a992971e9f84a\n~ Management Interface\n~ md5sum: dd10d25895d9994bd27ca896152f48ef\n~ VMware Server Linux client package\n~ md5sum: aae18f1f7b8811b5499e3a358754d4f8\n\n~ VMware ACE 2.0.3 and 1.0.5\n~ --------------------------\n~ http://www.vmware.com/download/ace/\n~ Windows Release notes:\n~ http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\n\n~ VMware Fusion 1.1.1\n~ -------------------\n~ http://www.vmware.com/download/fusion/\n~ Release notes:\n~ http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html\n~ md5sum: 38e116ec26b30e7a6ac47c249ef650d0\n\n~ VMware Player 2.0.3 and 1.0.6\n~ ----------------------\n~ http://www.vmware.com/download/player/\n~ Release notes Player 1.x:\n~ http://www.vmware.com/support/player/doc/releasenotes_player.html\n~ Release notes Player 2.0\n~ http://www.vmware.com/support/player2/doc/releasenotes_player2.html\n~ 2.0.3 Windows binary\n~ md5sum: 0c5009d3b569687ae139e13d24c868d3\n~ VMware Player 2.0.3 for Linux (.rpm)\n~ md5sum: 53502b2112a863356dcd13dd0d8dd8f2\n~ VMware Player 2.0.3 for Linux (.tar)\n~ md5sum: 2305fcff49bef6e4ad83742412eac978\n~ VMware Player 2.0.3 - 64-bit (.rpm)\n~ md5sum: cf945b571c4d96146ede010286fdfca5\n~ VMware Player 2.0.3 - 64-bit (.tar)\n~ md5sum: f99c5b293eb87c5f918ad24111565b9f\n~ 1.0.6 Windows binary\n~ md5sum: 895081406c4de5361a1700ec0473e49c\n~ Player 1.0.6 for Linux (.rpm)\n~ md5sum: 8adb23799dd2014be0b6d77243c76942\n~ Player 1.0.6 for Linux (.tar)\n~ md5sum: c358f8e1387fb60863077d6f8a9f7b3f\n\n5. References:\n\n~ CVE numbers\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1361\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1362\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5618\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1364\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1363\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1340\n\n- -------------------------------------------------------------------\n6. Contact:\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n~ * security-announce@lists.vmware.com\n~ * bugtraq@securityfocus.com\n~ * full-disclosure@lists.grok.org.uk\n\nE-mail: security@vmware.com\n\nSecurity web site\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFH3yTxS2KysvBH1xkRCHq8AJ0QOMocv/gSz/hgdojA39PGVO6pUACePCRv\nCv8MnL2bYPyDfYQ3f4IUL+w=\n=tFXS\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nOpenOffice.org 3 Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA38568\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38568/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in OpenOffice.org, which can\nbe exploited by malicious people to bypass certain security\nrestrictions, conduct spoofing attacks, or compromise a user\u0027s\nsystem. \n\n1) The included libxml2 library fails to properly verify signatures. \n\nThis is related to:\nSA21709\n\n2) An error in the included libxmlsec library can be exploited to\npotentially forge a valid signature. \n\nFor more information:\nSA35854\n\n3) An error in the included MSVC Runtime package can be exploited to\nbypass certain security features. \n\nFor more information see vulnerability #2 in:\nSA35967\n\n4) An error in the processing XPM files can be exploited to\npotentially execute arbitrary code. \n\n5) An error in the processing GIF files can be exploited to\npotentially execute arbitrary code. \n\n6) An error in the processing of Word documents can be exploited to\npotentially execute arbitrary code. \n\nSOLUTION:\nUpdate to version 3.2. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n4) Sebastian Apelt of siberas\n5) Frank Rei\\xdfner and Sebastian Apelt of siberas\n6) Nicolas Joly of Vupen\n\nORIGINAL ADVISORY:\nhttp://www.openoffice.org/security/cves/CVE-2006-4339.html\nhttp://www.openoffice.org/security/cves/CVE-2009-0217.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2493.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2949.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2950.html\nhttp://www.openoffice.org/security/cves/CVE-2009-3301-3302.html\n\nOTHER REFERENCES:\nSA21709:\nhttp://secunia.com/advisories/21709/\n\nSA35854:\nhttp://secunia.com/advisories/35854/\n\nSA35967:\nhttp://secunia.com/advisories/35967/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c00794048\nVersion: 1\n\nHPSBUX02165 SSRT061266 rev.1 - HP-UX VirtualVault Remote Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2006-10-31\nLast Updated: 2006-10-31\n\n\nPotential Security Impact: Remote Unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA security vulnerability has been identified in OpenSSL used in HP VirtualVault 4.7, 4.6, 4.5 and HP WebProxy that may allow remote unauthorized access. \n\nReferences: CVE-2006-4339\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.04 running Virtualvault 4.7 or Virtualvault 4.6 or Virtualvault 4.5 or HP WebProxy. \n\nBACKGROUND\n\nThe OpenSSL community has released OpenSSL 0.9.7.k version superseding the OpenSSL 0.9.7i release that was identified in the CVE report. \n\nNote: To determine if a system has an affected version, search the output of \"swlist -a revision -l fileset\" for an affected fileset. Then determine if the recommended patch or update is installed. \n\nAFFECTED VERSIONS \n\nHP-UX B.11.04 Virtualvault A.04.70 \n=========================== \nVaultWS.WS-CORE \nVaultTS.VV-IWS \nVaultTS.VV-CORE-CMN \nVaultTGP.TGP-CORE \naction: install PHSS_35463, PHSS_35460, PHSS_35481 or subsequent \n\nHP-UX B.11.04 Virtualvault A.04.70 (Apache 2.X) \n==================================== \nVaultWS.WS-CORE \naction: install PHSS_35436 or subsequent \n\nHP-UX B.11.04 Virtualvault A.04.60 \n=========================== \nVaultWS.WS-CORE \nVaultTS.VV-IWS \nVaultTS.VV-CORE-CMN \nVaultTGP.TGP-CORE \naction: install PHSS_35462, PHSS_35459, PHSS_35480 or subsequent \n\nHP-UX B.11.04 Virtualvault A.04.50 \n=========================== \nVaultWS.WS-CORE \nVaultTS.VV-IWS \nVaultTS.VV-IWS-JK \nVaultTS.VV-CORE-CMN \naction: install PHSS_35461, PHSS_35458 or subsequent \n\nHP-UX B.11.04 HP Webproxy A.02.10 (Apache 2.x) \n============================ \nHP_Webproxy.HPWEB-PX-CORE \naction: install PHSS_35437 or subsequent \n\nHP-UX B.11.04 HP Webproxy A.02.10 (Apache 1.x) \n============================ \nHP_Webproxy.HPWEB-PX-CORE \naction: install PHSS_35111 or subsequent \n\nHP-UX B.11.04 HP Webproxy A.02.00 \n============================ \nHP_Webproxy.HPWEB-PX-CORE \naction: install PHSS_35110 or subsequent \n\nEND AFFECTED VERSIONS \n\n\n\nRESOLUTION\n\nHP is making the following patches available to resolve this issue. \nThe patches are available for download from http://itrc.hp.com \n\nFor B.11.04 HP has made the following patches available: \nPHSS_35463 Virtualvault 4.7 OWS (Apache 1.x) update \nPHSS_35460 Virtualvault 4.7 IWS update \nPHSS_35481 Virtualvault 4.7 TGP update \nPHSS_35436 Virtualvault 4.7 OWS (Apache 2.x) update \nPHSS_35462 Virtualvault 4.6 OWS update \nPHSS_35459 Virtualvault 4.6 IWS update \nPHSS_35480 Virtualvault 4.6 TGP update \nPHSS_35461 Virtualvault 4.5 OWS update \nPHSS_35458 Virtualvault 4.5 IWS update \nPHSS_35437 Webproxy server 2.1 (Apache 2.x) update \nPHSS_35111 Webproxy server 2.1 (Apache 1.x) update \nPHSS_35110 Webproxy server 2.0 update \n\nPRODUCT SPECIFIC INFORMATION \nHP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA \n\nMANUAL ACTIONS: No \n\nHISTORY Version: 1 (rev.1) 31 October 2006 Initial release \n\nThird Party Security Patches: Third Party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services\nsupport channel. \n\nReport: To report a potential security vulnerability with any HP\nsupported product, send Email to: security-alert@hp.com. It is\nstrongly recommended that security related information being\ncommunicated to HP be encrypted using PGP, especially exploit\ninformation. To get the security-alert PGP key, please send an\ne-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP\nSecurity Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026\nlangcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\n\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n - check ALL categories for which alerts are required and\n continue. \nUnder Step2: your ITRC operating systems\n - verify your operating system selections are checked and\n save. \n\nTo update an existing subscription:\nhttp://h30046.www3.hp.com/subSignIn.php\nLog in on the web page:\n Subscriber\u0027s choice for Business: sign-in. \nOn the web page:\n Subscriber\u0027s Choice: your profile summary\n - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit:\nhttp://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters of the\nBulletin number in the title:\n\n GN = HP General SW,\n MA = HP Management Agents,\n MI = Misc. 3rd party SW,\n MP = HP MPE/iX,\n NS = HP NonStop Servers,\n OV = HP OpenVMS,\n PI = HP Printing \u0026 Imaging,\n ST = HP Storage SW,\n TL = HP Trusted Linux,\n TU = HP Tru64 UNIX,\n UX = HP-UX,\n VV = HP Virtual Vault\n\n\nSystem management and security procedures must be reviewed\nfrequently to maintain system integrity. HP is continually\nreviewing and enhancing the security features of software products\nto provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to\nbring to the attention of users of the affected HP products the\nimportant security information contained in this Bulletin. HP\nrecommends that all users determine the applicability of this\ninformation to their individual situations and take appropriate\naction. HP does not warrant that this information is necessarily\naccurate or complete for all user situations and, consequently, HP\nwill not be responsible for any damages resulting from user\u0027s use\nor disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either\nexpress or implied, including the warranties of merchantability\nand fitness for a particular purpose, title and non-infringement.\"\n\n\n(c)Copyright 2006 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or\neditorial errors or omissions contained herein. The information\nprovided is provided \"as is\" without warranty of any kind. To the\nextent permitted by law, neither HP nor its affiliates,\nsubcontractors or suppliers will be liable for incidental, special\nor consequential damages including downtime cost; lost profits;\ndamages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. \nThe information in this document is subject to change without\nnotice. Hewlett-Packard Company and the names of Hewlett-Packard\nproducts referenced herein are trademarks of Hewlett-Packard\nCompany in the United States and other countries. Other product\nand company names mentioned herein may be trademarks of their\nrespective owners", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "PACKETSTORM", "id": "86249" }, { "db": "PACKETSTORM", "id": "51624" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 1.6 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "SECUNIA", "id": "38568", "trust": 1.2 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "38567", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "64684", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86249", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51624", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "PACKETSTORM", "id": "86249" }, { "db": "PACKETSTORM", "id": "51624" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200609-0995", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-03-07T21:38:05.856000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.1, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.4, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.4, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.1, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.9, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5618" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2937" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1340" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2940" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5269" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ace/" }, { "trust": 0.1, "url": "http://www.vmware.com/download/player/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1362" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4343" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ws/ws5.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1363" }, { "trust": 0.1, "url": "http://www.vmware.com/download/fusion/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5618" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2940" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ws/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4343" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1364" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "http://www.vmware.com/download/server/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1364" }, { "trust": 0.1, "url": "http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1362" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2937" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2493.html" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-0217.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38568/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/35854/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-3301-3302.html" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2950.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2949.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/35967/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026" }, { "trust": 0.1, "url": "http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://itrc.hp.com" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "PACKETSTORM", "id": "86249" }, { "db": "PACKETSTORM", "id": "51624" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "PACKETSTORM", "id": "86249" }, { "db": "PACKETSTORM", "id": "51624" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2008-03-19T02:18:56", "db": "PACKETSTORM", "id": "64684" }, { "date": "2010-02-12T15:35:11", "db": "PACKETSTORM", "id": "86249" }, { "date": "2006-11-03T02:10:30", "db": "PACKETSTORM", "id": "51624" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 } }
var-200609-0837
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDKSA-2006:207 http://www.mandriva.com/security/
Package : bind Date : November 14, 2006 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0
Problem Description:
The BIND DNS server is vulnerable to the recently-discovered OpenSSL RSA signature verification problem (CVE-2006-4339). BIND uses RSA cryptography as part of its DNSSEC implementation. As a result, to resolve the security issue, these packages need to be upgraded and for both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to be generated using the "-e" option of dnssec-keygen, if the current keys were generated using the default exponent of 3.
You are able to determine if your keys are vulnerable by looking at the algorithm (1 or 5) and the first three characters of the Base64 encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with "AQM", "AQN", "AQO", or "AQP" are vulnerable.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445
Updated Packages:
Mandriva Linux 2006.0: 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2007.0: 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64: c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Corporate 3.0: fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 3.0/X86_64: e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 4.0: 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Multi Network Firewall 2.0: abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z 6faoicEmIFqGW4QuEVIhCbU= =bI0u -----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: OpenOffice.org 2 Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA38567
VERIFY ADVISORY: http://secunia.com/advisories/38567/
DESCRIPTION: Some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system.
For more information: SA38568
SOLUTION: Upgrade to version 3.2.
ORIGINAL ADVISORY: http://www.openoffice.org/security/cves/CVE-2006-4339.html http://www.openoffice.org/security/cves/CVE-2009-0217.html http://www.openoffice.org/security/cves/CVE-2009-2949.html http://www.openoffice.org/security/cves/CVE-2009-2950.html http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html
OTHER REFERENCES: SA38568: http://secunia.com/advisories/38568/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0837", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sun microsystems", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6k" }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "openssl", "scope": "eq", "trust": 0.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andy Davis advisories@irmplc.com\u203bVicente Aguilera Diaz vaguilera@isecauditors.com Esteban Martinez FayoTony FogartyOliver Karow Oliver.karow@gmx.de Joxean Koret joxeankoret@yahoo.es\u203bAlexander Kornbrust ak@red-database-security.com David Litchfield", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#594904", "trust": 0.8, "value": "0.63" }, { "author": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n \n Mandriva Linux Security Advisory MDKSA-2006:207\n http://www.mandriva.com/security/\n _______________________________________________________________________\n \n Package : bind\n Date : November 14, 2006\n Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\n _______________________________________________________________________\n \n Problem Description:\n \n The BIND DNS server is vulnerable to the recently-discovered OpenSSL\n RSA signature verification problem (CVE-2006-4339). BIND uses RSA\n cryptography as part of its DNSSEC implementation. As a result, to\n resolve the security issue, these packages need to be upgraded and for\n both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to\n be generated using the \"-e\" option of dnssec-keygen, if the current\n keys were generated using the default exponent of 3. \n\n You are able to determine if your keys are vulnerable by looking at the\n algorithm (1 or 5) and the first three characters of the Base64 encoded\n RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with \"AQM\", \"AQN\",\n \"AQO\", or \"AQP\" are vulnerable. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\n http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm\n 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm\n f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm\n fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm\n f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2007.0:\n 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm\n 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm\n 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Mandriva Linux 2007.0/X86_64:\n c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm\n 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm\n e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Corporate 3.0:\n fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm\n 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm\n 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm\n b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm\n ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm\n dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm\n daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm\n c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm\n 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm\n dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm\n 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm \n eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.2.2 (GNU/Linux)\n\niD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z\n6faoicEmIFqGW4QuEVIhCbU=\n=bI0u\n-----END PGP SIGNATURE-----\n\n. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nOpenOffice.org 2 Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA38567\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38567/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in OpenOffice.org, which can\nbe exploited by malicious people to bypass certain security\nrestrictions, conduct spoofing attacks, or compromise a user\u0027s\nsystem. \n\nFor more information:\nSA38568\n\nSOLUTION:\nUpgrade to version 3.2. \n\nORIGINAL ADVISORY:\nhttp://www.openoffice.org/security/cves/CVE-2006-4339.html\nhttp://www.openoffice.org/security/cves/CVE-2009-0217.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2949.html\nhttp://www.openoffice.org/security/cves/CVE-2009-2950.html\nhttp://www.openoffice.org/security/cves/CVE-2009-3301-3302.html\n\nOTHER REFERENCES:\nSA38568:\nhttp://secunia.com/advisories/38568/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 2.1 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "SECUNIA", "id": "38567", "trust": 1.2 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 1.1 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "SECTRACK", "id": "1017143", "trust": 0.8 }, { "db": "SECUNIA", "id": "22646", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "52186", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86234", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200609-0837", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-05-17T22:22:44.985000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOo_3.2.1_Win_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3189" }, { "title": "OOo_3.2.0_Linux_x86-64_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3193" }, { "title": "OOo_3.2.0_Linux_x86-64_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3192" }, { "title": "OOo_3.2.1_Linux_x86_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3191" }, { "title": "OOo_3.2.0_Solaris_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3195" }, { "title": "OOo_3.2.1_Linux_x86_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3190" }, { "title": "OOo_3.2.0_MacOS_x86_install_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3194" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.1, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.4, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://www.sun.com/software/products/appsrvr/index.xml" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=438cfb75" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=43a84f89" }, { "trust": 0.8, "url": "http://www.mozilla.org/projects/security/pki/nss/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102670-1 " }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/ssl" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2006/4299 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1017143 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22646 " }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-0217.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38568/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-3301-3302.html" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2950.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.openoffice.org/security/cves/cve-2009-2949.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38567/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "86234" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2006-11-16T16:32:32", "db": "PACKETSTORM", "id": "52186" }, { "date": "2010-02-12T13:01:15", "db": "PACKETSTORM", "id": "86234" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-09T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 } }
var-200609-1118
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. BIND uses RSA cryptography as part of its DNSSEC implementation. As a result, to resolve the security issue, these packages need to be upgraded and for both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to be generated using the "-e" option of dnssec-keygen, if the current keys were generated using the default exponent of 3.
You are able to determine if your keys are vulnerable by looking at the algorithm (1 or 5) and the first three characters of the Base64 encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with "AQM", "AQN", "AQO", or "AQP" are vulnerable.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445
Updated Packages:
Mandriva Linux 2006.0: 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm
Mandriva Linux 2007.0: 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64: c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm
Corporate 3.0: fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 3.0/X86_64: e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm
Corporate 4.0: 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm
Multi Network Firewall 2.0: abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z 6faoicEmIFqGW4QuEVIhCbU= =bI0u -----END PGP SIGNATURE-----
. OpenSSL Security Advisory [5th September 2006]
RSA Signature Forgery (CVE-2006-4339)
Vulnerability
Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Implementations may incorrectly verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature.
Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is used in X.509 certificates, all software that uses OpenSSL to verify X.509 certificates is potentially vulnerable, as well as any other use of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or TLS.
Recommendations
There are multiple ways to avoid this vulnerability. Any one of the following measures is sufficient. Upgrade the OpenSSL server software.
The vulnerability is resolved in the following versions of OpenSSL:
- in the 0.9.7 branch, version 0.9.7k (or later);
- in the 0.9.8 branch, version 0.9.8c (or later).
OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via
HTTP and FTP from the following master locations (you can find the
various FTP mirrors under http://www.openssl.org/source/mirror.html):
o http://www.openssl.org/source/
o ftp://ftp.openssl.org/source/
The distribution file names are:
o openssl-0.9.8c.tar.gz
MD5 checksum: 78454bec556bcb4c45129428a766c886
SHA1 checksum: d0798e5c7c4509d96224136198fa44f7f90e001d
o openssl-0.9.7k.tar.gz
MD5 checksum: be6bba1d67b26eabb48cf1774925416f
SHA1 checksum: 90056b8f5e518edc9f74f66784fbdcfd9b784dd2
The checksums were calculated using the following commands:
openssl md5 openssl-0.9*.tar.gz
openssl sha1 openssl-0.9*.tar.gz
- If this version upgrade is not an option at the present time,
alternatively the following patch may be applied to the OpenSSL
source code to resolve the problem. The patch is compatible with
the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL.
o http://www.openssl.org/news/patch-CVE-2006-4339.txt
Whether you choose to upgrade to a new version or to apply the patch, make sure to recompile any applications statically linked to OpenSSL libraries.
Acknowledgements
The OpenSSL team thank Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie, of Google Security, who successfully forged various certificates, showing OpenSSL was vulnerable, and provided the patch to fix the problems.
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
URL for this Security Advisory: http://www.openssl.org/news/secadv_20060905.txt
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
~ VMware Security Advisory
Advisory ID: VMSA-2008-0005 Synopsis: Updated VMware Workstation, VMware Player, VMware ~ Server, VMware ACE, and VMware Fusion resolve ~ critical security issues Issue date: 2008-03-17 Updated on: 2008-03-17 (initial release of advisory) CVE numbers: CVE-2008-0923 CVE-2008-0923 CVE-2008-1361 ~ CVE-2008-1362 CVE-2007-5269 CVE-2006-2940 ~ CVE-2006-2937 CVE-2006-4343 CVE-2006-4339 ~ CVE-2007-5618 CVE-2008-1364 CVE-2008-1363 ~ CVE-2008-1340
- Summary:
~ Several critical security vulnerabilities have been addressed ~ in the newest releases of VMware's hosted product line.
- Relevant releases:
~ VMware Workstation 6.0.2 and earlier ~ VMware Workstation 5.5.4 and earlier ~ VMware Player 2.0.2 and earlier ~ VMware Player 1.0.4 and earlier ~ VMware ACE 2.0.2 and earlier ~ VMware ACE 1.0.2 and earlier ~ VMware Server 1.0.4 and earlier ~ VMware Fusion 1.1 and earlier
- Problem description:
~ a. Host to guest shared folder (HGFS) traversal vulnerability
~ On Windows hosts, if you have configured a VMware host to guest ~ shared folder (HGFS), it is possible for a program running in the ~ guest to gain access to the host's file system and create or modify ~ executable files in sensitive locations.
NOTE: VMware Server is not affected because it doesn't use host to ~ guest shared folders. Because ~ ESX Server is based on a bare-metal hypervisor architecture ~ and not a hosted architecture, and it doesn't include any ~ shared folder abilities. Fusion and Linux based hosted ~ products are unaffected.
~ VMware would like to thank CORE Security Technologies for ~ working with us on this issue. This addresses advisory ~ CORE-2007-0930.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2008-0923 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ b. Insecure named pipes
~ An internal security audit determined that a malicious Windows ~ user could attain and exploit LocalSystem privileges by causing ~ the authd process to connect to a named pipe that is opened and ~ controlled by the malicious user.
~ The same internal security audit determined that a malicious ~ Windows user could exploit an insecurely created named pipe ~ object to escalate privileges or create a denial of service ~ attack. In this situation, the malicious user could ~ successfully impersonate authd and attain privileges under ~ which Authd is executing.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the names CVE-2008-1361, CVE-2008-1362 to these ~ issues.
~ Windows Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ c. Updated libpng library to version 1.2.22 to address various ~ security vulnerabilities
~ Several flaws were discovered in the way libpng handled various PNG ~ image chunks. An attacker could create a carefully crafted PNG ~ image file in such a way that it could cause an application linked ~ with libpng to crash when the file was manipulated.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2007-5269 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion is not affected by this issue.
~ d.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the following names to these issues: CVE-2006-2940, ~ CVE-2006-2937, CVE-2006-4343, CVE-2006-4339.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion is not affected by this issue.
~ e. VIX API default setting changed to a more secure default value
~ Workstation 6.0.2 allowed anonymous console access to the guest by ~ means of the VIX API. This release, Workstation 6.0.3, disables ~ this feature. This means that the Eclipse Integrated Virtual ~ Debugger and the Visual Studio Integrated Virtual Debugger will now ~ prompt for user account credentials to access a guest.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)
~ f. Windows 2000 based hosted products privilege escalation ~ vulnerability
~ This release addresses a potential privilege escalation on ~ Windows 2000 hosted products. Certain services may be improperly ~ registered and present a security vulnerability to Windows 2000 ~ machines.
~ VMware would like to thank Ray Hicken for reporting this issue and ~ David Maciejak for originally pointing out these types of ~ vulnerabilities.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2007-5618 to this issue.
~ Windows versions of Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ NOTE: Fusion and Linux based products are not affected by this ~ issue.
~ g. DHCP denial of service vulnerability
~ A potential denial of service issue affects DHCP service running ~ on the host.
~ VMware would like to thank Martin O'Neal for reporting this issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1364 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ VMware Fusion 1.1 upgrade to version 1.1.1 (Build# 72241)
~ NOTE: This issue doesn't affect the latest versions of VMware ~ Workstation 6, VMware Player 2, and ACE 2 products.
~ h. Local Privilege Escalation on Windows based platforms by ~ Hijacking VMware VMX configuration file
~ VMware uses a configuration file named "config.ini" which ~ is located in the application data directory of all users. ~ By manipulating this file, a user could gain elevated ~ privileges by hijacking the VMware VMX process.
~ VMware would like to thank Sun Bing for reporting the issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1363 to this issue.
~ Windows based Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)
~ i. Virtual Machine Communication Interface (VMCI) memory corruption ~ resulting in denial of service
~ VMCI was introduced in VMware Workstation 6.0, VMware Player 2.0, ~ and VMware ACE 2.0. It is an experimental, optional feature and ~ it may be possible to crash the host system by making specially ~ crafted calls to the VMCI interface. This may result in denial ~ of service via memory exhaustion and memory corruption.
~ VMware would like to thank Andrew Honig of the Department of ~ Defense for reporting this issue.
~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1340 to this issue.
~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)
- Solution:
Please review the Patch notes for your product and version and verify the md5sum of your downloaded file.
~ VMware Workstation 6.0.3 ~ ------------------------ ~ http://www.vmware.com/download/ws/ ~ Release notes: ~ http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html ~ Windows binary ~ md5sum: 323f054957066fae07735160b73b91e5 ~ RPM Installation file for 32-bit Linux ~ md5sum: c44183ad11082f05593359efd220944e ~ tar Installation file for 32-bit Linux ~ md5sum: 57601f238106cb12c1dea303ad1b4820 ~ RPM Installation file for 64-bit Linux ~ md5sum: e9ba644be4e39556724fa2901c5e94e9 ~ tar Installation file for 64-bit Linux ~ md5sum: d8d423a76f99a94f598077d41685e9a9
~ VMware Workstation 5.5.5 ~ ------------------------ ~ http://www.vmware.com/download/ws/ws5.html ~ Release notes: ~ http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html ~ Windows binary ~ md5sum: 9c2dd94db5eed93d7f64e8d6ba8d8bd3 ~ Compressed Tar archive for 32-bit Linux ~ md5sum: 77401c0842a151f0b2db0b4fcb0d16eb ~ Linux RPM version for 32-bit Linux ~ md5sum: c222b6db934deb9c1bb79b16b25a3202
~ VMware Server 1.0.5 ~ ------------------- ~ http://www.vmware.com/download/server/ ~ Release notes: ~ http://www.vmware.com/support/server/doc/releasenotes_server.html ~ VMware Server for Windows 32-bit and 64-bit ~ md5sum: 3c4a57310c55e17bf8e4a1059d5b36cc ~ VMware Server Windows client package ~ md5sum: cb3dd2439203dc510f4d95f06ba59d21 ~ VMware Server for Linux ~ md5sum: 161dcbe5af9bbd9834a86bf7c599903e ~ VMware Server for Linux rpm ~ md5sum: fc3b81ed18b53eda943a992971e9f84a ~ Management Interface ~ md5sum: dd10d25895d9994bd27ca896152f48ef ~ VMware Server Linux client package ~ md5sum: aae18f1f7b8811b5499e3a358754d4f8
~ VMware ACE 2.0.3 and 1.0.5 ~ -------------------------- ~ http://www.vmware.com/download/ace/ ~ Windows Release notes: ~ http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
~ VMware Fusion 1.1.1 ~ ------------------- ~ http://www.vmware.com/download/fusion/ ~ Release notes: ~ http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html ~ md5sum: 38e116ec26b30e7a6ac47c249ef650d0
~ VMware Player 2.0.3 and 1.0.6 ~ ---------------------- ~ http://www.vmware.com/download/player/ ~ Release notes Player 1.x: ~ http://www.vmware.com/support/player/doc/releasenotes_player.html ~ Release notes Player 2.0 ~ http://www.vmware.com/support/player2/doc/releasenotes_player2.html ~ 2.0.3 Windows binary ~ md5sum: 0c5009d3b569687ae139e13d24c868d3 ~ VMware Player 2.0.3 for Linux (.rpm) ~ md5sum: 53502b2112a863356dcd13dd0d8dd8f2 ~ VMware Player 2.0.3 for Linux (.tar) ~ md5sum: 2305fcff49bef6e4ad83742412eac978 ~ VMware Player 2.0.3 - 64-bit (.rpm) ~ md5sum: cf945b571c4d96146ede010286fdfca5 ~ VMware Player 2.0.3 - 64-bit (.tar) ~ md5sum: f99c5b293eb87c5f918ad24111565b9f ~ 1.0.6 Windows binary ~ md5sum: 895081406c4de5361a1700ec0473e49c ~ Player 1.0.6 for Linux (.rpm) ~ md5sum: 8adb23799dd2014be0b6d77243c76942 ~ Player 1.0.6 for Linux (.tar) ~ md5sum: c358f8e1387fb60863077d6f8a9f7b3f
- References:
~ CVE numbers ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1361 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1362 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5618 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1364 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1363 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1340
- Contact:
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
~ * security-announce@lists.vmware.com ~ * bugtraq@securityfocus.com ~ * full-disclosure@lists.grok.org.uk
E-mail: security@vmware.com
Security web site http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFH3yTxS2KysvBH1xkRCHq8AJ0QOMocv/gSz/hgdojA39PGVO6pUACePCRv Cv8MnL2bYPyDfYQ3f4IUL+w= =tFXS -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-1118", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sun microsystems", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher reported this issue to the vendor.", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#594904", "trust": 0.8, "value": "0.63" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. BIND uses RSA\n cryptography as part of its DNSSEC implementation. As a result, to\n resolve the security issue, these packages need to be upgraded and for\n both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to\n be generated using the \"-e\" option of dnssec-keygen, if the current\n keys were generated using the default exponent of 3. \n\n You are able to determine if your keys are vulnerable by looking at the\n algorithm (1 or 5) and the first three characters of the Base64 encoded\n RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with \"AQM\", \"AQN\",\n \"AQO\", or \"AQP\" are vulnerable. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\n http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm\n 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm\n f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm\n fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm\n f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm \n 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm\n\n Mandriva Linux 2007.0:\n 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm\n 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm\n 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Mandriva Linux 2007.0/X86_64:\n c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm\n 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm\n e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm \n 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm\n\n Corporate 3.0:\n fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm\n 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm\n 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm\n b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm\n ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm \n 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm\n dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm\n daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm\n c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm\n 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm \n ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm\n dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm\n 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm \n eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.2.2 (GNU/Linux)\n\niD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z\n6faoicEmIFqGW4QuEVIhCbU=\n=bI0u\n-----END PGP SIGNATURE-----\n\n. OpenSSL Security Advisory [5th September 2006]\n\nRSA Signature Forgery (CVE-2006-4339)\n=====================================\n\nVulnerability\n-------------\n\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5\nsignatures. Implementations\nmay incorrectly verify the certificate if they are not checking for\nexcess data in the RSA exponentiation result of the signature. \n\nSince there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is\nused in X.509 certificates, all software that uses OpenSSL to verify\nX.509 certificates is potentially vulnerable, as well as any other use\nof PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or\nTLS. \n\nRecommendations\n---------------\n\nThere are multiple ways to avoid this vulnerability. Any one of the\nfollowing measures is sufficient. Upgrade the OpenSSL server software. \n\n The vulnerability is resolved in the following versions of OpenSSL:\n\n - in the 0.9.7 branch, version 0.9.7k (or later);\n - in the 0.9.8 branch, version 0.9.8c (or later). \n\n OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via\n HTTP and FTP from the following master locations (you can find the\n various FTP mirrors under http://www.openssl.org/source/mirror.html):\n\n o http://www.openssl.org/source/\n o ftp://ftp.openssl.org/source/\n\n The distribution file names are:\n\n o openssl-0.9.8c.tar.gz\n MD5 checksum: 78454bec556bcb4c45129428a766c886\n SHA1 checksum: d0798e5c7c4509d96224136198fa44f7f90e001d\n\n o openssl-0.9.7k.tar.gz\n MD5 checksum: be6bba1d67b26eabb48cf1774925416f\n SHA1 checksum: 90056b8f5e518edc9f74f66784fbdcfd9b784dd2\n \n The checksums were calculated using the following commands:\n\n openssl md5 openssl-0.9*.tar.gz\n openssl sha1 openssl-0.9*.tar.gz\n\n2. If this version upgrade is not an option at the present time,\n alternatively the following patch may be applied to the OpenSSL\n source code to resolve the problem. The patch is compatible with\n the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL. \n\n o http://www.openssl.org/news/patch-CVE-2006-4339.txt\n\nWhether you choose to upgrade to a new version or to apply the patch,\nmake sure to recompile any applications statically linked to OpenSSL\nlibraries. \n\n \nAcknowledgements\n----------------\n\nThe OpenSSL team thank Philip Mackenzie, Marius Schilder, Jason Waddle\nand Ben Laurie, of Google Security, who successfully forged various\ncertificates, showing OpenSSL was vulnerable, and provided the patch\nto fix the problems. \n\n\nReferences\n----------\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\nhttp://www.imc.org/ietf-openpgp/mail-archive/msg14307.html\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20060905.txt\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- -------------------------------------------------------------------\n~ VMware Security Advisory\n\nAdvisory ID: VMSA-2008-0005\nSynopsis: Updated VMware Workstation, VMware Player, VMware\n~ Server, VMware ACE, and VMware Fusion resolve\n~ critical security issues\nIssue date: 2008-03-17\nUpdated on: 2008-03-17 (initial release of advisory)\nCVE numbers: CVE-2008-0923 CVE-2008-0923 CVE-2008-1361\n~ CVE-2008-1362 CVE-2007-5269 CVE-2006-2940\n~ CVE-2006-2937 CVE-2006-4343 CVE-2006-4339\n~ CVE-2007-5618 CVE-2008-1364 CVE-2008-1363\n~ CVE-2008-1340\n- -------------------------------------------------------------------\n\n1. Summary:\n\n~ Several critical security vulnerabilities have been addressed\n~ in the newest releases of VMware\u0027s hosted product line. \n\n2. Relevant releases:\n\n~ VMware Workstation 6.0.2 and earlier\n~ VMware Workstation 5.5.4 and earlier\n~ VMware Player 2.0.2 and earlier\n~ VMware Player 1.0.4 and earlier\n~ VMware ACE 2.0.2 and earlier\n~ VMware ACE 1.0.2 and earlier\n~ VMware Server 1.0.4 and earlier\n~ VMware Fusion 1.1 and earlier\n\n3. Problem description:\n\n~ a. Host to guest shared folder (HGFS) traversal vulnerability\n\n~ On Windows hosts, if you have configured a VMware host to guest\n~ shared folder (HGFS), it is possible for a program running in the\n~ guest to gain access to the host\u0027s file system and create or modify\n~ executable files in sensitive locations. \n\nNOTE: VMware Server is not affected because it doesn\u0027t use host to\n~ guest shared folders. Because\n~ ESX Server is based on a bare-metal hypervisor architecture\n~ and not a hosted architecture, and it doesn\u0027t include any\n~ shared folder abilities. Fusion and Linux based hosted\n~ products are unaffected. \n\n~ VMware would like to thank CORE Security Technologies for\n~ working with us on this issue. This addresses advisory\n~ CORE-2007-0930. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the name CVE-2008-0923 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ b. Insecure named pipes\n\n~ An internal security audit determined that a malicious Windows\n~ user could attain and exploit LocalSystem privileges by causing\n~ the authd process to connect to a named pipe that is opened and\n~ controlled by the malicious user. \n\n~ The same internal security audit determined that a malicious\n~ Windows user could exploit an insecurely created named pipe\n~ object to escalate privileges or create a denial of service\n~ attack. In this situation, the malicious user could\n~ successfully impersonate authd and attain privileges under\n~ which Authd is executing. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the names CVE-2008-1361, CVE-2008-1362 to these\n~ issues. \n\n~ Windows Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ c. Updated libpng library to version 1.2.22 to address various\n~ security vulnerabilities\n\n~ Several flaws were discovered in the way libpng handled various PNG\n~ image chunks. An attacker could create a carefully crafted PNG\n~ image file in such a way that it could cause an application linked\n~ with libpng to crash when the file was manipulated. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ has assigned the name CVE-2007-5269 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion is not affected by this issue. \n\n~ d. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the following names to these issues: CVE-2006-2940,\n~ CVE-2006-2937, CVE-2006-4343, CVE-2006-4339. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion is not affected by this issue. \n\n~ e. VIX API default setting changed to a more secure default value\n\n~ Workstation 6.0.2 allowed anonymous console access to the guest by\n~ means of the VIX API. This release, Workstation 6.0.3, disables\n~ this feature. This means that the Eclipse Integrated Virtual\n~ Debugger and the Visual Studio Integrated Virtual Debugger will now\n~ prompt for user account credentials to access a guest. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n\n~ f. Windows 2000 based hosted products privilege escalation\n~ vulnerability\n\n~ This release addresses a potential privilege escalation on\n~ Windows 2000 hosted products. Certain services may be improperly\n~ registered and present a security vulnerability to Windows 2000\n~ machines. \n\n~ VMware would like to thank Ray Hicken for reporting this issue and\n~ David Maciejak for originally pointing out these types of\n~ vulnerabilities. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2007-5618 to this issue. \n\n~ Windows versions of Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ NOTE: Fusion and Linux based products are not affected by this\n~ issue. \n\n~ g. DHCP denial of service vulnerability\n\n~ A potential denial of service issue affects DHCP service running\n~ on the host. \n\n~ VMware would like to thank Martin O\u0027Neal for reporting this issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1364 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n~ VMware Fusion 1.1 upgrade to version 1.1.1 (Build# 72241)\n\n~ NOTE: This issue doesn\u0027t affect the latest versions of VMware\n~ Workstation 6, VMware Player 2, and ACE 2 products. \n\n~ h. Local Privilege Escalation on Windows based platforms by\n~ Hijacking VMware VMX configuration file\n\n~ VMware uses a configuration file named \"config.ini\" which\n~ is located in the application data directory of all users. \n~ By manipulating this file, a user could gain elevated\n~ privileges by hijacking the VMware VMX process. \n\n~ VMware would like to thank Sun Bing for reporting the issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1363 to this issue. \n\n~ Windows based Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404)\n~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846)\n\n~ i. Virtual Machine Communication Interface (VMCI) memory corruption\n~ resulting in denial of service\n\n~ VMCI was introduced in VMware Workstation 6.0, VMware Player 2.0,\n~ and VMware ACE 2.0. It is an experimental, optional feature and\n~ it may be possible to crash the host system by making specially\n~ crafted calls to the VMCI interface. This may result in denial\n~ of service via memory exhaustion and memory corruption. \n\n~ VMware would like to thank Andrew Honig of the Department of\n~ Defense for reporting this issue. \n\n~ The Common Vulnerabilities and Exposures project (cve.mitre.org)\n~ assigned the name CVE-2008-1340 to this issue. \n\n~ Hosted products\n~ ---------------\n~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004)\n~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004)\n~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004)\n\n4. Solution:\n\nPlease review the Patch notes for your product and version and verify\nthe md5sum of your downloaded file. \n\n~ VMware Workstation 6.0.3\n~ ------------------------\n~ http://www.vmware.com/download/ws/\n~ Release notes:\n~ http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\n~ Windows binary\n~ md5sum: 323f054957066fae07735160b73b91e5\n~ RPM Installation file for 32-bit Linux\n~ md5sum: c44183ad11082f05593359efd220944e\n~ tar Installation file for 32-bit Linux\n~ md5sum: 57601f238106cb12c1dea303ad1b4820\n~ RPM Installation file for 64-bit Linux\n~ md5sum: e9ba644be4e39556724fa2901c5e94e9\n~ tar Installation file for 64-bit Linux\n~ md5sum: d8d423a76f99a94f598077d41685e9a9\n\n~ VMware Workstation 5.5.5\n~ ------------------------\n~ http://www.vmware.com/download/ws/ws5.html\n~ Release notes:\n~ http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\n~ Windows binary\n~ md5sum: 9c2dd94db5eed93d7f64e8d6ba8d8bd3\n~ Compressed Tar archive for 32-bit Linux\n~ md5sum: 77401c0842a151f0b2db0b4fcb0d16eb\n~ Linux RPM version for 32-bit Linux\n~ md5sum: c222b6db934deb9c1bb79b16b25a3202\n\n~ VMware Server 1.0.5\n~ -------------------\n~ http://www.vmware.com/download/server/\n~ Release notes:\n~ http://www.vmware.com/support/server/doc/releasenotes_server.html\n~ VMware Server for Windows 32-bit and 64-bit\n~ md5sum: 3c4a57310c55e17bf8e4a1059d5b36cc\n~ VMware Server Windows client package\n~ md5sum: cb3dd2439203dc510f4d95f06ba59d21\n~ VMware Server for Linux\n~ md5sum: 161dcbe5af9bbd9834a86bf7c599903e\n~ VMware Server for Linux rpm\n~ md5sum: fc3b81ed18b53eda943a992971e9f84a\n~ Management Interface\n~ md5sum: dd10d25895d9994bd27ca896152f48ef\n~ VMware Server Linux client package\n~ md5sum: aae18f1f7b8811b5499e3a358754d4f8\n\n~ VMware ACE 2.0.3 and 1.0.5\n~ --------------------------\n~ http://www.vmware.com/download/ace/\n~ Windows Release notes:\n~ http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\n\n~ VMware Fusion 1.1.1\n~ -------------------\n~ http://www.vmware.com/download/fusion/\n~ Release notes:\n~ http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html\n~ md5sum: 38e116ec26b30e7a6ac47c249ef650d0\n\n~ VMware Player 2.0.3 and 1.0.6\n~ ----------------------\n~ http://www.vmware.com/download/player/\n~ Release notes Player 1.x:\n~ http://www.vmware.com/support/player/doc/releasenotes_player.html\n~ Release notes Player 2.0\n~ http://www.vmware.com/support/player2/doc/releasenotes_player2.html\n~ 2.0.3 Windows binary\n~ md5sum: 0c5009d3b569687ae139e13d24c868d3\n~ VMware Player 2.0.3 for Linux (.rpm)\n~ md5sum: 53502b2112a863356dcd13dd0d8dd8f2\n~ VMware Player 2.0.3 for Linux (.tar)\n~ md5sum: 2305fcff49bef6e4ad83742412eac978\n~ VMware Player 2.0.3 - 64-bit (.rpm)\n~ md5sum: cf945b571c4d96146ede010286fdfca5\n~ VMware Player 2.0.3 - 64-bit (.tar)\n~ md5sum: f99c5b293eb87c5f918ad24111565b9f\n~ 1.0.6 Windows binary\n~ md5sum: 895081406c4de5361a1700ec0473e49c\n~ Player 1.0.6 for Linux (.rpm)\n~ md5sum: 8adb23799dd2014be0b6d77243c76942\n~ Player 1.0.6 for Linux (.tar)\n~ md5sum: c358f8e1387fb60863077d6f8a9f7b3f\n\n5. References:\n\n~ CVE numbers\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1361\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1362\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5618\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1364\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1363\n~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1340\n\n- -------------------------------------------------------------------\n6. Contact:\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n~ * security-announce@lists.vmware.com\n~ * bugtraq@securityfocus.com\n~ * full-disclosure@lists.grok.org.uk\n\nE-mail: security@vmware.com\n\nSecurity web site\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFH3yTxS2KysvBH1xkRCHq8AJ0QOMocv/gSz/hgdojA39PGVO6pUACePCRv\nCv8MnL2bYPyDfYQ3f4IUL+w=\n=tFXS\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "PACKETSTORM", "id": "64684" } ], "trust": 3.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 1.6 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 1.1 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "38567", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "SECTRACK", "id": "1017143", "trust": 0.8 }, { "db": "SECUNIA", "id": "22646", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "52186", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "49749", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "64684", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200609-1118", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-02-20T00:26:20.655000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.2, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.4, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.4, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.1, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://www.sun.com/software/products/appsrvr/index.xml" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=438cfb75" }, { "trust": 0.8, "url": "http://www.sun.com/download/products.xml?id=43a84f89" }, { "trust": 0.8, "url": "http://www.mozilla.org/projects/security/pki/nss/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102670-1 " }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/ssl" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2006/4299 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1017143 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22646 " }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.openssl.org/source/" }, { "trust": 0.1, "url": "http://www.openssl.org/news/patch-cve-2006-4339.txt" }, { "trust": 0.1, "url": "http://www.openssl.org/source/mirror.html):" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5618" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2937" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1340" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2940" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5269" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ace/" }, { "trust": 0.1, "url": "http://www.vmware.com/download/player/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1362" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4343" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ws/ws5.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1363" }, { "trust": 0.1, "url": "http://www.vmware.com/download/fusion/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5618" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2940" }, { "trust": 0.1, "url": "http://www.vmware.com/download/ws/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4343" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1364" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "http://www.vmware.com/download/server/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1364" }, { "trust": 0.1, "url": "http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1362" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2937" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#594904" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52186" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "PACKETSTORM", "id": "64684" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2006-11-16T16:32:32", "db": "PACKETSTORM", "id": "52186" }, { "date": "2006-09-07T08:41:36", "db": "PACKETSTORM", "id": "49749" }, { "date": "2008-03-19T02:18:56", "db": "PACKETSTORM", "id": "64684" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2007-02-09T00:00:00", "db": "CERT/CC", "id": "VU#594904" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 } }
var-200609-1252
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. Oracle has released a Critical Patch Update advisory for January 2007 to address these vulnerabilities for supported releases. Earlier unsupported releases are likely to be affected by these issues as well. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. Various levels of authorization are needed to leverage some of the issues, but other issues do not require any authorization. The most severe of the vulnerabilities could possibly expose affected computers to complete compromise. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
VMware Security Advisory
Advisory ID: VMSA-2007-0001 Synopsis: VMware ESX server security updates Issue date: 2007-01-08 Updated on: 2007-01-08 CVE: CVE-2006-3589 CVE-2006-2937 CVE-2006-2940 CVE-2006-3738 CVE-2006-4339 CVE-2006-4343 CVE-2006-4980
- Summary:
Updated ESX Patches address several security issues.
- Relevant releases:
VMware ESX 3.0.1 without patch ESX-9986131 VMware ESX 3.0.0 without patch ESX-3069097
VMware ESX 2.5.4 prior to upgrade patch 3 VMware ESX 2.5.3 prior to upgrade patch 6 VMware ESX 2.1.3 prior to upgrade patch 4 VMware ESX 2.0.2 prior to upgrade patch 4
- Problem description:
Problems addressed by these patches:
a. Incorrect permissions on SSL key files generated by vmware-config (CVE-2006-3589):
ESX 3.0.1: does not have this problem
ESX 3.0.0: does not have this problem
ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)
ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)
ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)
ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)
A possible security issue with the configuration program
vmware-config which could set incorrect permissions on SSL key
files. Local users may be able to obtain access to the SSL key
files. The Common Vulnerabilities and Exposures project
(cve.mitre.org) assigned the name CVE-2006-3589 to this issue.
b. OpenSSL library vulnerabilities:
ESX 3.0.1: corrected by ESX 3.0.1 Patch ESX-9986131
ESX 3.0.0: corrected by ESX 3.0.0 Patch ESX-3069097
ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)
ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)
ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)
ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)
(CVE-2006-2937) OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d
allows remote attackers to cause a denial of service (infinite
loop and memory consumption) via malformed ASN.1 structures that
trigger an improperly handled error condition.
(CVE-2006-2940) OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d,
and earlier versions allows attackers to cause a denial of service
(CPU consumption) via parasitic public keys with large (1) "public
exponent" or (2) "public modulus" values in X.509 certificates that
require extra time to process when using RSA signature verification.
(CVE-2006-4343) The get_server_hello function in the SSLv2 client
code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
earlier versions allows remote servers to cause a denial of service
(client crash) via unknown vectors that trigger a null pointer
dereference.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the names CVE-2006-2937, CVE-2006-2940, CVE-2006-3738,
CVE-2006-4339, and CVE-2006-4343 to these issues.
c. Updated OpenSSH package addresses the following possible security issues:
ESX 3.0.1: corrected by Patch ESX-9986131
ESX 3.0.0: corrected by Patch ESX-3069097
ESX 2.5.4: does not have these problems
ESX 2.5.3: does not have these problems
ESX 2.1.3: does not have these problems
ESX 2.0.2: does not have these problems
(CVE-2004-2069) sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly
other versions, when using privilege separation, does not properly
signal the non-privileged process when a session has been terminated
after exceeding the LoginGraceTime setting, which leaves the
connection open and allows remote attackers to cause a denial of
service (connection consumption).
(CVE-2006-0225) scp in OpenSSH 4.2p1 allows attackers to execute
arbitrary commands via filenames that contain shell metacharacters
or spaces, which are expanded twice.
(CVE-2003-0386) OpenSSH 3.6.1 and earlier, when restricting host
access by numeric IP addresses and with VerifyReverseMapping
disabled, allows remote attackers to bypass "from=" and "user@host"
address restrictions by connecting to a host from a system whose
reverse DNS hostname contains the numeric IP address.
(CVE-2006-4924) sshd in OpenSSH before 4.4, when using the version 1
SSH protocol, allows remote attackers to cause a denial of service
(CPU consumption) via an SSH packet that contains duplicate blocks,
which is not properly handled by the CRC compensation attack
detector.
NOTE: ESX by default disables version 1 SSH protocol.
(CVE-2006-5051) Signal handler race condition in OpenSSH before 4.4
allows remote attackers to cause a denial of service (crash), and
possibly execute arbitrary code if GSSAPI authentication is enabled,
via unspecified vectors that lead to a double-free.
NOTE: ESX doesn't use GSSAPI by default.
(CVE-2006-5794) Unspecified vulnerability in the sshd Privilege
Separation Monitor in OpenSSH before 4.5 causes weaker verification
that authentication has been successful, which might allow attackers
to bypass authentication.
NOTE: as of 20061108, it is believed that this issue is only
exploitable by leveraging vulnerabilities in the unprivileged
process, which are not known to exist.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the names CVE-2004-2069, CVE-2006-0225, CVE-2003-0386,
CVE-2006-4924, CVE-2006-5051, and CVE-2006-5794 to these issues.
d. Object reuse problems with newly created virtual disk (.vmdk or .dsk) files:
ESX 3.0.1: does not have this problem
ESX 3.0.0: does not have this problem
ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)
ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)
ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)
ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)
A possible security issue with virtual disk (.vmdk or .dsk) files
that are newly created, but contain blocks from recently deleted
virtual disk files. Information belonging to the previously
deleted virtual disk files could be revealed in newly created
virtual disk files.
VMware recommends the following workaround: When creating new
virtual machines on an ESX Server that may contain sensitive
data, use vmkfstools with the -W option. This initializes the
virtual disk with zeros. NOTE: ESX 3.x defines this option as -w.
e. Buffer overflow in Python function repr():
ESX 3.0.1: corrected by Patch ESX-9986131
ESX 3.0.0: corrected by ESX-3069097
ESX 2.5.4: does not have this problem
ESX 2.5.3: does not have this problem
ESX 2.1.3: does not have this problem
ESX 2.0.2: does not have this problem
A possible security issue with how the Python function repr()
function handles UTF-32/UCS-4 strings. Python applications
using this function can open a security vulnerability that could
allow the execution of arbitrary code.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2006-4980 to this issue.
- Solution:
Please review the Patch notes for your version of ESX and verify the md5sum.
ESX 3.0.1 http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html md5usm: 239375e107fd4c7af57663f023863fcb
ESX 3.0.0 http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html md5sum: ca9947239fffda708f2c94f519df33dc
ESX 2.5.4 http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html md5sum: 239375e107fd4c7af57663f023863fcb
ESX 2.5.3 http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html md5sum: f90fcab28362edbf2311f3ca90cc7739
ESX 2.1.3 http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html md5sum: 7d7d0e40f4dccd5ca64b9c13a856da8f
ESX 2.0.2 http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html md5sum: 925e70f28d17714c53fdbd24de64329f
- References:
ESX 3.0.0 Patch URL: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html Knowledge base URL: http://kb.vmware.com/kb/3069097
ESX 3.0.1 Patch URL: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html Knowledge base URL: http://kb.vmware.com/kb/9986131
ESX 2.5.4 Patch URL: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
ESX 2.5.3 Patch URL: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
ESX 2.1.3 Patch URL: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
ESX 2.0.2 Patch URL: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3589 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980
- Contact:
http://www.vmware.com/security
VMware Security Response Policy http://www.vmware.com/vmtn/technology/security/security_response.html
E-mail: security@vmware.com
Copyright 2007 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFovs16KjQhy2pPmkRCMfyAKCXhdGwZyXW5VzSwcOmu2NNXKN/OwCgo+CE neFG0RikD74TCYeXKW6CBy4= =9/6k -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01118771 Version: 1
HPSBMA02250 SSRT061275 rev.1 - HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2007-08-01 Last Updated: 2007-08-01
Potential Security Impact: Remote execution of arbitrary code and Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified HP System Management Homepage (SMH) for Linux and Windows.
References: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-3747, CVE-2006-4339, CVE-2006-4343
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) versions prior to 2.1.7 running on Linux and Windows.
BACKGROUND
RESOLUTION HP has provided System Management Homepage (SMH) version 2.1.7 or subsequent for each platform to resolve this issue. A more recent version is available: System Management Homepage (SMH) version 2.1.8
HP System Management Homepage for Linux (x86) version 2.1.8-177 can be downloaded from http://h18023.www1.hp.com/support/files/server/us/download/26864.html
HP System Management Homepage for Linux (AMD64/EM64T) version 2.1.8-177 can be downloaded from http://h18023.www1.hp.com/support/files/server/us/download/26866.html
HP System Management Homepage for Windows version 2.1.8-179 can be downloaded from http://h18023.www1.hp.com/support/files/server/us/download/26977.html
PRODUCT SPECIFIC INFORMATION
HISTORY: Version:1 (rev.1) - 1 August 2007 Initial Release
Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
\xa9Copyright 2007 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-1252", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.10" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "5.0" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.48" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.47" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.22" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.7" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i standard edition fips", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.7" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i personal edition fips", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.7.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.6.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0.5" }, { "model": "oracle9i enterprise edition fips", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.5" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1.4" }, { "model": "oracle8i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7.4" }, { "model": "oracle8i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7.4.0" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.2" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.1" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.4.2" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.5" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.2" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.1" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.2" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.1" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.4" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3.1" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.4.0" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.0.0" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.2.0" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.1.0" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.0.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.0.1" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.2" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.1" }, { "model": "identity management 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.4.0.1" }, { "model": "9i application server release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.0.2.2" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.1" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.4" }, { "model": "enterprise manager grid control 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3" }, { "model": "e-business suite 11i cu2", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.9" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.8" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.7" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.0" }, { "model": "developer suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.0.2" }, { "model": "developer suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.3" }, { "model": "developer suite 6i", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "application server release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "210.1.2.0.2" }, { "model": "application server release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "210.1.2.0.1" }, { "model": "application server release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "210.1.2.0.0" }, { "model": "application server release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "29.0.2.3" }, { "model": "application server 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.3" }, { "model": "application server 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.2" }, { "model": "application server 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4.1" }, { "model": "application server 10g", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.4" }, { "model": "oracle for openview for linux ltu", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "oracle for openview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1.1" }, { "model": "oracle for openview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1.7" }, { "model": "oracle for openview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.2" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher reported this issue to the vendor.", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. Oracle has released a Critical Patch Update advisory for January 2007 to address these vulnerabilities for supported releases. Earlier unsupported releases are likely to be affected by these issues as well. \nThe issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. Various levels of authorization are needed to leverage some of the issues, but other issues do not require any authorization. The most severe of the vulnerabilities could possibly expose affected computers to complete compromise. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- -------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2007-0001\nSynopsis: VMware ESX server security updates\nIssue date: 2007-01-08\nUpdated on: 2007-01-08\nCVE: CVE-2006-3589 CVE-2006-2937 CVE-2006-2940\n CVE-2006-3738 CVE-2006-4339 CVE-2006-4343\n CVE-2006-4980\n- -------------------------------------------------------------------\n\n1. Summary:\n\nUpdated ESX Patches address several security issues. \n\n2. Relevant releases:\n\nVMware ESX 3.0.1 without patch ESX-9986131\nVMware ESX 3.0.0 without patch ESX-3069097\n\nVMware ESX 2.5.4 prior to upgrade patch 3\nVMware ESX 2.5.3 prior to upgrade patch 6\nVMware ESX 2.1.3 prior to upgrade patch 4\nVMware ESX 2.0.2 prior to upgrade patch 4\n\n3. Problem description:\n\nProblems addressed by these patches:\n\na. Incorrect permissions on SSL key files generated by vmware-config\n(CVE-2006-3589):\n\n ESX 3.0.1: does not have this problem\n ESX 3.0.0: does not have this problem\n ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)\n ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)\n ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)\n ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)\n\n A possible security issue with the configuration program\n vmware-config which could set incorrect permissions on SSL key\n files. Local users may be able to obtain access to the SSL key\n files. The Common Vulnerabilities and Exposures project\n (cve.mitre.org) assigned the name CVE-2006-3589 to this issue. \n\nb. OpenSSL library vulnerabilities:\n\n ESX 3.0.1: corrected by ESX 3.0.1 Patch ESX-9986131\n ESX 3.0.0: corrected by ESX 3.0.0 Patch ESX-3069097\n ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)\n ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)\n ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)\n ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)\n\n (CVE-2006-2937) OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d\n allows remote attackers to cause a denial of service (infinite\n loop and memory consumption) via malformed ASN.1 structures that\n trigger an improperly handled error condition. \n\n (CVE-2006-2940) OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d,\n and earlier versions allows attackers to cause a denial of service\n (CPU consumption) via parasitic public keys with large (1) \"public\n exponent\" or (2) \"public modulus\" values in X.509 certificates that\n require extra time to process when using RSA signature verification. \n\n (CVE-2006-4343) The get_server_hello function in the SSLv2 client\n code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and\n earlier versions allows remote servers to cause a denial of service\n (client crash) via unknown vectors that trigger a null pointer\n dereference. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n assigned the names CVE-2006-2937, CVE-2006-2940, CVE-2006-3738,\n CVE-2006-4339, and CVE-2006-4343 to these issues. \n\nc. Updated OpenSSH package addresses the following possible security issues:\n\n ESX 3.0.1: corrected by Patch ESX-9986131\n ESX 3.0.0: corrected by Patch ESX-3069097\n ESX 2.5.4: does not have these problems\n ESX 2.5.3: does not have these problems\n ESX 2.1.3: does not have these problems\n ESX 2.0.2: does not have these problems\n\n (CVE-2004-2069) sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly\n other versions, when using privilege separation, does not properly\n signal the non-privileged process when a session has been terminated\n after exceeding the LoginGraceTime setting, which leaves the\n connection open and allows remote attackers to cause a denial of\n service (connection consumption). \n\n (CVE-2006-0225) scp in OpenSSH 4.2p1 allows attackers to execute\n arbitrary commands via filenames that contain shell metacharacters\n or spaces, which are expanded twice. \n\n (CVE-2003-0386) OpenSSH 3.6.1 and earlier, when restricting host\n access by numeric IP addresses and with VerifyReverseMapping\n disabled, allows remote attackers to bypass \"from=\" and \"user@host\"\n address restrictions by connecting to a host from a system whose\n reverse DNS hostname contains the numeric IP address. \n\n (CVE-2006-4924) sshd in OpenSSH before 4.4, when using the version 1\n SSH protocol, allows remote attackers to cause a denial of service\n (CPU consumption) via an SSH packet that contains duplicate blocks,\n which is not properly handled by the CRC compensation attack\n detector. \n\n NOTE: ESX by default disables version 1 SSH protocol. \n\n (CVE-2006-5051) Signal handler race condition in OpenSSH before 4.4\n allows remote attackers to cause a denial of service (crash), and\n possibly execute arbitrary code if GSSAPI authentication is enabled,\n via unspecified vectors that lead to a double-free. \n\n NOTE: ESX doesn\u0027t use GSSAPI by default. \n\n (CVE-2006-5794) Unspecified vulnerability in the sshd Privilege\n Separation Monitor in OpenSSH before 4.5 causes weaker verification\n that authentication has been successful, which might allow attackers\n to bypass authentication. \n\n NOTE: as of 20061108, it is believed that this issue is only\n exploitable by leveraging vulnerabilities in the unprivileged\n process, which are not known to exist. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n assigned the names CVE-2004-2069, CVE-2006-0225, CVE-2003-0386,\n CVE-2006-4924, CVE-2006-5051, and CVE-2006-5794 to these issues. \n\nd. Object reuse problems with newly created virtual disk (.vmdk or .dsk)\nfiles:\n\n ESX 3.0.1: does not have this problem\n ESX 3.0.0: does not have this problem\n ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502)\n ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703)\n ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803)\n ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801)\n\n A possible security issue with virtual disk (.vmdk or .dsk) files\n that are newly created, but contain blocks from recently deleted\n virtual disk files. Information belonging to the previously\n deleted virtual disk files could be revealed in newly created\n virtual disk files. \n\n VMware recommends the following workaround: When creating new\n virtual machines on an ESX Server that may contain sensitive\n data, use vmkfstools with the -W option. This initializes the\n virtual disk with zeros. NOTE: ESX 3.x defines this option as -w. \n\ne. Buffer overflow in Python function repr():\n\n ESX 3.0.1: corrected by Patch ESX-9986131\n ESX 3.0.0: corrected by ESX-3069097\n ESX 2.5.4: does not have this problem\n ESX 2.5.3: does not have this problem\n ESX 2.1.3: does not have this problem\n ESX 2.0.2: does not have this problem\n\n A possible security issue with how the Python function repr()\n function handles UTF-32/UCS-4 strings. Python applications\n using this function can open a security vulnerability that could\n allow the execution of arbitrary code. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n assigned the name CVE-2006-4980 to this issue. \n\n4. Solution:\n\nPlease review the Patch notes for your version of ESX and verify the md5sum. \n\n ESX 3.0.1\n http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\n md5usm: 239375e107fd4c7af57663f023863fcb\n\n ESX 3.0.0\n http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\n md5sum: ca9947239fffda708f2c94f519df33dc\n\n ESX 2.5.4\n http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html\n md5sum: 239375e107fd4c7af57663f023863fcb\n\n ESX 2.5.3\n http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html\n md5sum: f90fcab28362edbf2311f3ca90cc7739\n\n ESX 2.1.3\n http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html\n md5sum: 7d7d0e40f4dccd5ca64b9c13a856da8f\n\n ESX 2.0.2\n http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html\n md5sum: 925e70f28d17714c53fdbd24de64329f\n\n\n5. References:\n\nESX 3.0.0 Patch URL:\nhttp://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\nKnowledge base URL: http://kb.vmware.com/kb/3069097\n\nESX 3.0.1 Patch URL:\nhttp://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\nKnowledge base URL: http://kb.vmware.com/kb/9986131\n\nESX 2.5.4 Patch URL:\nhttp://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html\n\nESX 2.5.3 Patch URL:\nhttp://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html\n\nESX 2.1.3 Patch URL:\nhttp://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html\n\nESX 2.0.2 Patch URL:\nhttp://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3589\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980\n\n6. Contact:\n\nhttp://www.vmware.com/security\n\nVMware Security Response Policy\nhttp://www.vmware.com/vmtn/technology/security/security_response.html\n\nE-mail: security@vmware.com\n\nCopyright 2007 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFFovs16KjQhy2pPmkRCMfyAKCXhdGwZyXW5VzSwcOmu2NNXKN/OwCgo+CE\nneFG0RikD74TCYeXKW6CBy4=\n=9/6k\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01118771\nVersion: 1\n\nHPSBMA02250 SSRT061275 rev.1 - HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2007-08-01\nLast Updated: 2007-08-01\n\n\nPotential Security Impact: Remote execution of arbitrary code and Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified HP System Management Homepage (SMH) for Linux and Windows. \n\nReferences: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-3747, CVE-2006-4339, CVE-2006-4343\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) versions prior to 2.1.7 running on Linux and Windows. \n\nBACKGROUND\n\n\nRESOLUTION\nHP has provided System Management Homepage (SMH) version 2.1.7 or subsequent for each platform to resolve this issue. \nA more recent version is available: System Management Homepage (SMH) version 2.1.8 \n\nHP System Management Homepage for Linux (x86) version 2.1.8-177 can be downloaded from \nhttp://h18023.www1.hp.com/support/files/server/us/download/26864.html \n\nHP System Management Homepage for Linux (AMD64/EM64T) version 2.1.8-177 can be downloaded from \nhttp://h18023.www1.hp.com/support/files/server/us/download/26866.html \n\nHP System Management Homepage for Windows version 2.1.8-179 can be downloaded from \nhttp://h18023.www1.hp.com/support/files/server/us/download/26977.html \n\nPRODUCT SPECIFIC INFORMATION \n\nHISTORY: \nVersion:1 (rev.1) - 1 August 2007 Initial Release \n\nThird Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com \nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com \n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email: \nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC \nOn the web page: ITRC security bulletins and patch sign-up \nUnder Step1: your ITRC security bulletins and patches \n - check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems \n - verify your operating system selections are checked and save. \n\n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php \nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do \n\n\n* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: \n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux \nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n \n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\n\\xa9Copyright 2007 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" }, { "db": "PACKETSTORM", "id": "53566" }, { "db": "PACKETSTORM", "id": "58346" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22083", "trust": 2.9 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.1 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 1.8 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "38567", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "CERT/CC", "id": "VU#221788", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "53566", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58346", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" }, { "db": "PACKETSTORM", "id": "53566" }, { "db": "PACKETSTORM", "id": "58346" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200609-1252", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-03-16T20:18:27.377000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.1, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.6, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.1, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.1, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.6, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.3, "url": "http://www.red-database-security.com/advisory/oracle_buffer_overflow_ons.html" }, { "trust": 0.3, "url": "http://www.red-database-security.com/advisory/oracle_xmldb_css2.html" }, { "trust": 0.3, "url": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2007.html" }, { "trust": 0.3, "url": "http://www.integrigy.com/security-resources/analysis/oracle-cpu-january-2007/view" }, { "trust": 0.3, "url": "http://www.integrigy.com/security-resources/analysis/cpu-january-2007-tech-matrix/view" }, { "trust": 0.3, "url": "http://www.appsecinc.com/resources/alerts/oracle/2007-01.shtml" }, { "trust": 0.3, "url": "http://www.appsecinc.com/resources/alerts/oracle/2007-03.shtml" }, { "trust": 0.3, "url": "http://www.appsecinc.com/resources/alerts/oracle/2007-06.shtml" }, { "trust": 0.3, "url": "http://www.appsecinc.com/resources/alerts/oracle/2007-02.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/index.html" }, { "trust": 0.3, "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html" }, { "trust": 0.3, "url": "https://www.it-isac.org/postings/cyber/alertdetail.php?id=4092" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/221788" }, { "trust": 0.3, "url": "/archive/1/457193" }, { "trust": 0.3, "url": "/archive/1/464470" }, { "trust": 0.3, "url": "/archive/1/458657" }, { "trust": 0.3, "url": "/archive/1/458036" }, { "trust": 0.3, "url": "/archive/1/458006" }, { "trust": 0.3, "url": "/archive/1/458037" }, { "trust": 0.3, "url": "/archive/1/458005" }, { "trust": 0.3, "url": "/archive/1/458041" }, { "trust": 0.3, "url": "/archive/1/458038" }, { "trust": 0.3, "url": "/archive/1/458475" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2937" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4343" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2940" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3738" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/9986131" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.vmware.com/vmtn/technology/security/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2940" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3589" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3589" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4980" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4980" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/3069097" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4343" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3738" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2937" }, { "trust": 0.1, "url": "http://h18023.www1.hp.com/support/files/server/us/download/26977.html" }, { "trust": 0.1, "url": "http://h18023.www1.hp.com/support/files/server/us/download/26866.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3747" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://h18023.www1.hp.com/support/files/server/us/download/26864.html" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" }, { "db": "PACKETSTORM", "id": "53566" }, { "db": "PACKETSTORM", "id": "58346" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" }, { "db": "PACKETSTORM", "id": "53566" }, { "db": "PACKETSTORM", "id": "58346" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2007-01-16T00:00:00", "db": "BID", "id": "22083" }, { "date": "2007-01-13T22:56:30", "db": "PACKETSTORM", "id": "53566" }, { "date": "2007-08-08T07:19:47", "db": "PACKETSTORM", "id": "58346" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2008-05-20T23:05:00", "db": "BID", "id": "22083" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "19849" }, { "db": "BID", "id": "22083" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "19849" } ], "trust": 0.3 } }
var-200609-0959
Vulnerability from variot
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. This vulnerability may allow an attacker to forge RSA signatures. Adobe Reader fails to properly handle RSA signatures. Adobe Reader contains an issue where it may fail to properly verify RSA signatures. Masahiko Takenaka of FUJITSU LABORATORIES LTD. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to forge an RSA signature on a PDF document. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. OpenSSL Security Advisory [5th September 2006]
RSA Signature Forgery (CVE-2006-4339)
Vulnerability
Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Implementations may incorrectly verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature.
Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is used in X.509 certificates, all software that uses OpenSSL to verify X.509 certificates is potentially vulnerable, as well as any other use of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or TLS.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2006-4339 to this issue.
Recommendations
There are multiple ways to avoid this vulnerability. Any one of the following measures is sufficient.
-
Upgrade the OpenSSL server software.
The vulnerability is resolved in the following versions of OpenSSL:
- in the 0.9.7 branch, version 0.9.7k (or later);
- in the 0.9.8 branch, version 0.9.8c (or later).
OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html):
o http://www.openssl.org/source/ o ftp://ftp.openssl.org/source/
The distribution file names are:
o openssl-0.9.8c.tar.gz MD5 checksum: 78454bec556bcb4c45129428a766c886 SHA1 checksum: d0798e5c7c4509d96224136198fa44f7f90e001d o openssl-0.9.7k.tar.gz MD5 checksum: be6bba1d67b26eabb48cf1774925416f SHA1 checksum: 90056b8f5e518edc9f74f66784fbdcfd9b784dd2
The checksums were calculated using the following commands:
openssl md5 openssl-0.9*.tar.gz openssl sha1 openssl-0.9*.tar.gz
-
If this version upgrade is not an option at the present time, alternatively the following patch may be applied to the OpenSSL source code to resolve the problem. The patch is compatible with the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL.
o http://www.openssl.org/news/patch-CVE-2006-4339.txt
Whether you choose to upgrade to a new version or to apply the patch, make sure to recompile any applications statically linked to OpenSSL libraries.
Acknowledgements
The OpenSSL team thank Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie, of Google Security, who successfully forged various certificates, showing OpenSSL was vulnerable, and provided the patch to fix the problems.
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
URL for this Security Advisory: http://www.openssl.org/news/secadv_20060905.txt
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0959", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.6k" }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": "reader", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "8.x" }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus application server version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus server - enterprise edition", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus server - standard edition", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus server - standard edition version 4", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus server - web edition", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus server - web edition version 4", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "web server", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional" }, { "model": "ucosminexus developer light", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "openssl", "scope": "eq", "trust": 0.6, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4339" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andy Davis advisories@irmplc.com\u203bVicente Aguilera Diaz vaguilera@isecauditors.com Esteban Martinez FayoTony FogartyOliver Karow Oliver.karow@gmx.de Joxean Koret joxeankoret@yahoo.es\u203bAlexander Kornbrust ak@red-database-security.com David Litchfield", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "cve": "CVE-2006-4339", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2012-000079", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4339", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#386964", "trust": 0.8, "value": "0.32" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "IPA", "id": "JVNDB-2012-000079", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. This vulnerability may allow an attacker to forge RSA signatures. Adobe Reader fails to properly handle RSA signatures. Adobe Reader contains an issue where it may fail to properly verify RSA signatures. Masahiko Takenaka of FUJITSU LABORATORIES LTD. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to forge an RSA signature on a PDF document. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. OpenSSL Security Advisory [5th September 2006]\n\nRSA Signature Forgery (CVE-2006-4339)\n=====================================\n\nVulnerability\n-------------\n\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5\nsignatures. Implementations\nmay incorrectly verify the certificate if they are not checking for\nexcess data in the RSA exponentiation result of the signature. \n\nSince there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is\nused in X.509 certificates, all software that uses OpenSSL to verify\nX.509 certificates is potentially vulnerable, as well as any other use\nof PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or\nTLS. \n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2006-4339 to this issue. \n\nRecommendations\n---------------\n\nThere are multiple ways to avoid this vulnerability. Any one of the\nfollowing measures is sufficient. \n\n1. Upgrade the OpenSSL server software. \n\n The vulnerability is resolved in the following versions of OpenSSL:\n\n - in the 0.9.7 branch, version 0.9.7k (or later);\n - in the 0.9.8 branch, version 0.9.8c (or later). \n\n OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via\n HTTP and FTP from the following master locations (you can find the\n various FTP mirrors under http://www.openssl.org/source/mirror.html):\n\n o http://www.openssl.org/source/\n o ftp://ftp.openssl.org/source/\n\n The distribution file names are:\n\n o openssl-0.9.8c.tar.gz\n MD5 checksum: 78454bec556bcb4c45129428a766c886\n SHA1 checksum: d0798e5c7c4509d96224136198fa44f7f90e001d\n\n o openssl-0.9.7k.tar.gz\n MD5 checksum: be6bba1d67b26eabb48cf1774925416f\n SHA1 checksum: 90056b8f5e518edc9f74f66784fbdcfd9b784dd2\n \n The checksums were calculated using the following commands:\n\n openssl md5 openssl-0.9*.tar.gz\n openssl sha1 openssl-0.9*.tar.gz\n\n2. If this version upgrade is not an option at the present time,\n alternatively the following patch may be applied to the OpenSSL\n source code to resolve the problem. The patch is compatible with\n the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL. \n\n o http://www.openssl.org/news/patch-CVE-2006-4339.txt\n\nWhether you choose to upgrade to a new version or to apply the patch,\nmake sure to recompile any applications statically linked to OpenSSL\nlibraries. \n\n \nAcknowledgements\n----------------\n\nThe OpenSSL team thank Philip Mackenzie, Marius Schilder, Jason Waddle\nand Ben Laurie, of Google Security, who successfully forged various\ncertificates, showing OpenSSL was vulnerable, and provided the patch\nto fix the problems. \n\n\nReferences\n----------\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339\nhttp://www.imc.org/ietf-openpgp/mail-archive/msg14307.html\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20060905.txt\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4339" }, { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "49749" } ], "trust": 3.42 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#845620", "trust": 2.9 }, { "db": "NVD", "id": "CVE-2006-4339", "trust": 2.8 }, { "db": "BID", "id": "22083", "trust": 2.6 }, { "db": "SECUNIA", "id": "21709", "trust": 1.8 }, { "db": "JVN", "id": "JVN51615542", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2012-000079", "trust": 1.8 }, { "db": "BID", "id": "19849", "trust": 1.3 }, { "db": "SECUNIA", "id": "25399", "trust": 1.0 }, { "db": "SECUNIA", "id": "22936", "trust": 1.0 }, { "db": "SECUNIA", "id": "22260", "trust": 1.0 }, { "db": "SECUNIA", "id": "22671", "trust": 1.0 }, { "db": "SECUNIA", "id": "23841", "trust": 1.0 }, { "db": "SECUNIA", "id": "26329", "trust": 1.0 }, { "db": "SECUNIA", "id": "21785", "trust": 1.0 }, { "db": "SECUNIA", "id": "22325", "trust": 1.0 }, { "db": "SECUNIA", "id": "21870", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22934", "trust": 1.0 }, { "db": "SECUNIA", "id": "22689", "trust": 1.0 }, { "db": "SECUNIA", "id": "22036", "trust": 1.0 }, { "db": "SECUNIA", "id": "22509", "trust": 1.0 }, { "db": "SECUNIA", "id": "23915", "trust": 1.0 }, { "db": "SECUNIA", "id": "21927", "trust": 1.0 }, { "db": "SECUNIA", "id": "22939", "trust": 1.0 }, { "db": "SECUNIA", "id": "28115", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22733", "trust": 1.0 }, { "db": "SECUNIA", "id": "22938", "trust": 1.0 }, { "db": "SECUNIA", "id": "21852", "trust": 1.0 }, { "db": "SECUNIA", "id": "22932", "trust": 1.0 }, { "db": "SECUNIA", "id": "21873", "trust": 1.0 }, { "db": "SECUNIA", "id": "22711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22758", "trust": 1.0 }, { "db": "SECUNIA", "id": "60799", "trust": 1.0 }, { "db": "SECUNIA", "id": "24950", "trust": 1.0 }, { "db": "SECUNIA", "id": "23155", "trust": 1.0 }, { "db": "SECUNIA", "id": "38567", "trust": 1.0 }, { "db": "SECUNIA", "id": "22937", "trust": 1.0 }, { "db": "SECUNIA", "id": "41818", "trust": 1.0 }, { "db": "SECUNIA", "id": "21930", "trust": 1.0 }, { "db": "SECUNIA", "id": "38568", "trust": 1.0 }, { "db": "SECUNIA", "id": "21776", "trust": 1.0 }, { "db": "SECUNIA", "id": "22523", "trust": 1.0 }, { "db": "SECUNIA", "id": "24930", "trust": 1.0 }, { "db": "SECUNIA", "id": "22799", "trust": 1.0 }, { "db": "SECUNIA", "id": "25649", "trust": 1.0 }, { "db": "SECUNIA", "id": "21982", "trust": 1.0 }, { "db": "SECUNIA", "id": "23794", "trust": 1.0 }, { "db": "SECUNIA", "id": "21767", "trust": 1.0 }, { "db": "SECUNIA", "id": "21906", "trust": 1.0 }, { "db": "SECUNIA", "id": "25284", "trust": 1.0 }, { "db": "SECUNIA", "id": "22232", "trust": 1.0 }, { "db": "SECUNIA", "id": "23680", "trust": 1.0 }, { "db": "SECUNIA", "id": "22513", "trust": 1.0 }, { "db": "SECUNIA", "id": "21846", "trust": 1.0 }, { "db": "SECUNIA", "id": "22949", "trust": 1.0 }, { "db": "SECUNIA", "id": "21823", "trust": 1.0 }, { "db": "SECUNIA", "id": "22161", "trust": 1.0 }, { "db": "SECUNIA", "id": "22940", "trust": 1.0 }, { "db": "SECUNIA", "id": "26893", "trust": 1.0 }, { "db": "SECUNIA", "id": "22226", "trust": 1.0 }, { "db": "SECUNIA", "id": "21778", "trust": 1.0 }, { "db": "SECUNIA", "id": "23455", "trust": 1.0 }, { "db": "SECUNIA", "id": "22948", "trust": 1.0 }, { "db": "SECUNIA", "id": "21812", "trust": 1.0 }, { "db": "SECUNIA", "id": "22585", "trust": 1.0 }, { "db": "SECUNIA", "id": "22284", "trust": 1.0 }, { "db": "SECUNIA", "id": "21791", "trust": 1.0 }, { "db": "SECUNIA", "id": "22545", "trust": 1.0 }, { "db": "SECUNIA", "id": "22259", "trust": 1.0 }, { "db": "SECUNIA", "id": "24099", "trust": 1.0 }, { "db": "SECUNIA", "id": "31492", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1401", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-4224", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4417", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3793", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4586", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4329", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4216", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-5146", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0343", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0905", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4205", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3730", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4206", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3936", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1945", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4750", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4744", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2010-0366", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0254", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2315", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3453", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4207", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3566", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1815", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-4327", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2163", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-2783", "trust": 1.0 }, { "db": "USCERT", "id": "TA06-333A", "trust": 1.0 }, { "db": "SECTRACK", "id": "1016791", "trust": 1.0 }, { "db": "SECTRACK", "id": "1017522", "trust": 1.0 }, { "db": "BID", "id": "28276", "trust": 1.0 }, { "db": "OSVDB", "id": "28549", "trust": 1.0 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "BID", "id": "20246", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#386964", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200609-044", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "49749", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "id": "VAR-200609-0959", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-04-04T20:39:33.547000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Adobe Reader", "trust": 0.8, "url": "http://get.adobe.com/reader/" }, { "title": "HS07-034", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs07-034/index.html" }, { "title": "OOo_3.2.1_Win_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3189" }, { "title": "OOo_3.2.0_Linux_x86-64_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3193" }, { "title": "OOo_3.2.0_Linux_x86-64_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3192" }, { "title": "OOo_3.2.1_Linux_x86_install-deb_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3191" }, { "title": "OOo_3.2.0_Solaris_x86_install-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3195" }, { "title": "OOo_3.2.1_Linux_x86_install-rpm-wJRE_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3190" }, { "title": "OOo_3.2.0_MacOS_x86_install_zh-CN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=3194" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "CNNVD", "id": "CNNVD-200609-044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 }, { "problemtype": "CWE-255", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 2.2, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 2.1, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.8, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 1.8, "url": "http://jvn.jp/en/jp/jvn51615542/index.html" }, { "trust": 1.4, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 1.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 1.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 1.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 1.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 1.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 1.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 1.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 1.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 1.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 1.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01070495" }, { "trust": 1.0, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771" }, { "trust": 1.0, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540" }, { "trust": 1.0, "url": "http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html" }, { "trust": 1.0, "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "trust": 1.0, "url": "http://openvpn.net/changelog.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21709" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21767" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21776" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21778" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21785" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21812" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21823" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21846" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21852" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21870" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21873" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21927" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/21982" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22161" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22232" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22259" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22260" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22509" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22513" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22523" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22545" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22585" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22689" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22711" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22733" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22758" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22799" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22932" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22934" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22936" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22937" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22938" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22939" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22940" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22949" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23155" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23455" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23680" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23794" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24099" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24950" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25399" }, { "trust": 1.0, "url": "http://secunia.com/advisories/25649" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26329" }, { "trust": 1.0, "url": "http://secunia.com/advisories/26893" }, { "trust": 1.0, "url": "http://secunia.com/advisories/28115" }, { "trust": 1.0, "url": "http://secunia.com/advisories/31492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/38568" }, { "trust": 1.0, "url": "http://secunia.com/advisories/41818" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60799" }, { "trust": 1.0, "url": "http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1016791" }, { "trust": 1.0, "url": "http://securitytracker.com/id?1017522" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "trust": 1.0, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2127.html" }, { "trust": 1.0, "url": "http://support.attachmate.com/techdocs/2128.html" }, { "trust": 1.0, "url": "http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 1.0, "url": "http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1174" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.0, "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:161" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:177" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:178" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:207" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "trust": 1.0, "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "trust": 1.0, "url": "http://www.openbsd.org/errata.html" }, { "trust": 1.0, "url": "http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html" }, { "trust": 1.0, "url": "http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html" }, { "trust": 1.0, "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "trust": 1.0, "url": "http://www.osvdb.org/28549" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2006-0661.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0062.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0072.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2007-0073.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2008-0629.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/28276" }, { "trust": 1.0, "url": "http://www.serv-u.com/releasenotes/" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "trust": 1.0, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html" }, { "trust": 1.0, "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0005.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "trust": 1.0, "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-1633" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-616" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656" }, { "trust": 1.0, "url": "https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23386964/index.html" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20246" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4339" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 0.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339" }, { "trust": 0.1, "url": "http://www.openssl.org/source/" }, { "trust": 0.1, "url": "http://www.openssl.org/news/patch-cve-2006-4339.txt" }, { "trust": 0.1, "url": "http://www.openssl.org/source/mirror.html):" } ], "sources": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#386964" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "db": "PACKETSTORM", "id": "49749" }, { "db": "CNNVD", "id": "CNNVD-200609-044" }, { "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2012-08-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "date": "2006-09-07T08:41:36", "db": "PACKETSTORM", "id": "49749" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2006-09-05T17:04:00", "db": "NVD", "id": "CVE-2006-4339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#386964" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2014-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000079" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-044" }, { "date": "2018-10-17T21:35:10.617000", "db": "NVD", "id": "CVE-2006-4339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL SSLv2 client code fails to properly check for NULL", "sources": [ { "db": "CERT/CC", "id": "VU#386964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-044" } ], "trust": 0.6 } }
cve-2006-4339
Vulnerability from jvndb
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN51615542/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4339 | |
CERT-VN | http://www.kb.cert.org/vuls/id/845620 | |
Credentials Management(CWE-255) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000079.html", "dc:date": "2014-05-23T18:34+09:00", "dcterms:issued": "2012-08-30T13:57+09:00", "dcterms:modified": "2014-05-23T18:34+09:00", "description": "Adobe Reader fails to properly handle RSA signatures.\r\n\r\nAdobe Reader contains an issue where it may fail to properly verify RSA signatures.\r\n\r\nMasahiko Takenaka of FUJITSU LABORATORIES LTD. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000079.html", "sec:cpe": [ { "#text": "cpe:/a:adobe:acrobat_reader", "@product": "Adobe Reader", "@vendor": "Adobe Inc.", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "@product": "Cosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_standard", "@product": "Cosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_version_5", "@product": "Cosminexus Application Server Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "@product": "Cosminexus Developer Light Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "@product": "Cosminexus Developer Professional Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "@product": "Cosminexus Developer Standard Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_version_5", "@product": "Cosminexus Developer Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_enterprise_edition", "@product": "Cosminexus Server - Enterprise Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition", "@product": "Cosminexus Server - Standard Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition_version_4", "@product": "Cosminexus Server - Standard Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition", "@product": "Cosminexus Server - Web Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition_version_4", "@product": "Cosminexus Server - Web Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_web_server", "@product": "Hitachi Web Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "@product": "uCosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_standard", "@product": "uCosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer", "@product": "uCosminexus Developer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_light", "@product": "uCosminexus Developer Light", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_standard", "@product": "uCosminexus Developer Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_architect", "@product": "uCosminexus Service Architect", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_platform", "@product": "uCosminexus Service Platform", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2012-000079", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN51615542/index.html", "@id": "JVN#51615542", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339", "@id": "CVE-2006-4339", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4339", "@id": "CVE-2006-4339", "@source": "NVD" }, { "#text": "http://www.kb.cert.org/vuls/id/845620", "@id": "US-CERT Vulnerability Note VU#845620", "@source": "CERT-VN" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-255", "@title": "Credentials Management(CWE-255)" } ], "title": "Adobe Reader fails to properly handle signatures" }
cve-2006-4339
Vulnerability from jvndb
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000772.html", "dc:date": "2014-05-23T18:32+09:00", "dcterms:issued": "2008-05-21T00:00+09:00", "dcterms:modified": "2014-05-23T18:32+09:00", "description": "Hitachi Web Server accepts an SSL certificate sent by a clinet trying to connect to the Server even if the certificate is fraudulent.\r\n\r\nThe vulnerability does not affect the product if the SSL authenticaton client feature is disabled.", "link": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000772.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "@product": "Cosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_standard", "@product": "Cosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_version_5", "@product": "Cosminexus Application Server Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "@product": "Cosminexus Developer Light Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "@product": "Cosminexus Developer Professional Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "@product": "Cosminexus Developer Standard Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_version_5", "@product": "Cosminexus Developer Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_enterprise_edition", "@product": "Cosminexus Server - Enterprise Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition", "@product": "Cosminexus Server - Standard Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition_version_4", "@product": "Cosminexus Server - Standard Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition", "@product": "Cosminexus Server - Web Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition_version_4", "@product": "Cosminexus Server - Web Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_web_server", "@product": "Hitachi Web Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "@product": "uCosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_standard", "@product": "uCosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer", "@product": "uCosminexus Developer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_light", "@product": "uCosminexus Developer Light", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_standard", "@product": "uCosminexus Developer Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_architect", "@product": "uCosminexus Service Architect", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_platform", "@product": "uCosminexus Service Platform", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2007-000772", "sec:references": [ { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5810", "@id": "CVE-2007-5810", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339", "@id": "CVE-2006-4339", "@source": "CVE" }, { "#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5810", "@id": "CVE-2007-5810", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4339", "@id": "CVE-2006-4339", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/27421", "@id": "SA27421", "@source": "SECUNIA" }, { "#text": "http://xforce.iss.net/xforce/xfdb/28755", "@id": "28755", "@source": "XF" }, { "#text": "http://www.frsirt.com/english/advisories/2007/3666", "@id": "FrSIRT/ADV-2007-3666", "@source": "FRSIRT" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" } ], "title": "Hitachi Web Server SSL Client Authentication Vulnerability" }
rhsa-2006_0661
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages are now available to correct a security issue.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The OpenSSL toolkit provides support for secure communications between\nmachines. OpenSSL includes a certificate management tool and shared\nlibraries which provide various cryptographic algorithms and protocols.\n\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5\nsignatures. Where an RSA key with exponent 3 is used it may be possible\nfor an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly\nverified by implementations that do not check for excess data in the RSA\nexponentiation result of the signature. \n\nThe Google Security Team discovered that OpenSSL is vulnerable to this\nattack. This issue affects applications that use OpenSSL to verify X.509\ncertificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nThis errata also resolves a problem where a customized ca-bundle.crt file\nwas overwritten when the openssl package was upgraded.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.\n\nNote: After installing this update, users are advised to either restart all\nservices that use OpenSSL or restart their system.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0661", "url": "https://access.redhat.com/errata/RHSA-2006:0661" }, { "category": "external", "summary": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html", "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20060905.txt", "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "170740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170740" }, { "category": "external", "summary": "175811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175811" }, { "category": "external", "summary": "205180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=205180" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0661.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-14T10:04:23+00:00", "generator": { "date": "2024-11-14T10:04:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2006:0661", "initial_release_date": "2006-09-06T20:15:00+00:00", "revision_history": [ { "date": "2006-09-06T20:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-06T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:04:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.43?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.ia64", "product": { "name": "openssl096b-0:0.9.6b-16.43.ia64", "product_id": "openssl096b-0:0.9.6b-16.43.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.ia64", "product": { "name": "openssl-devel-0:0.9.7a-33.18.ia64", "product_id": "openssl-devel-0:0.9.7a-33.18.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.ia64", "product": { "name": "openssl-0:0.9.7a-33.18.ia64", "product_id": "openssl-0:0.9.7a-33.18.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.ia64", "product": { "name": "openssl-perl-0:0.9.7a-33.18.ia64", "product_id": "openssl-perl-0:0.9.7a-33.18.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.43?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.ia64", "product": { "name": "openssl096b-0:0.9.6b-22.43.ia64", "product_id": "openssl096b-0:0.9.6b-22.43.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.ia64", "product": { "name": "openssl-perl-0:0.9.7a-43.11.ia64", "product_id": "openssl-perl-0:0.9.7a-43.11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.ia64", "product": { "name": "openssl-devel-0:0.9.7a-43.11.ia64", "product_id": "openssl-devel-0:0.9.7a-43.11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.ia64", "product": { "name": "openssl-0:0.9.7a-43.11.ia64", "product_id": "openssl-0:0.9.7a-43.11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.43?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.i386", "product": { "name": "openssl096b-0:0.9.6b-16.43.i386", "product_id": "openssl096b-0:0.9.6b-16.43.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.i386", "product": { "name": "openssl-devel-0:0.9.7a-33.18.i386", "product_id": "openssl-devel-0:0.9.7a-33.18.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.i386", "product": { "name": "openssl-0:0.9.7a-33.18.i386", "product_id": "openssl-0:0.9.7a-33.18.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.i386", "product": { "name": "openssl-perl-0:0.9.7a-33.18.i386", "product_id": "openssl-perl-0:0.9.7a-33.18.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i386", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.43?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.i386", "product": { "name": "openssl096b-0:0.9.6b-22.43.i386", "product_id": "openssl096b-0:0.9.6b-22.43.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i386", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.i386", "product": { "name": "openssl-devel-0:0.9.7a-43.11.i386", "product_id": "openssl-devel-0:0.9.7a-43.11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.i386", "product": { "name": "openssl-perl-0:0.9.7a-43.11.i386", "product_id": "openssl-perl-0:0.9.7a-43.11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.i386", "product": { "name": "openssl-0:0.9.7a-43.11.i386", "product_id": "openssl-0:0.9.7a-43.11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.43?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.x86_64", "product": { "name": "openssl096b-0:0.9.6b-16.43.x86_64", "product_id": "openssl096b-0:0.9.6b-16.43.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-33.18.x86_64", "product_id": "openssl-devel-0:0.9.7a-33.18.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.x86_64", "product": { "name": "openssl-0:0.9.7a-33.18.x86_64", "product_id": "openssl-0:0.9.7a-33.18.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-33.18.x86_64", "product_id": "openssl-perl-0:0.9.7a-33.18.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.43?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.x86_64", "product": { "name": "openssl096b-0:0.9.6b-22.43.x86_64", "product_id": "openssl096b-0:0.9.6b-22.43.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-43.11.x86_64", "product_id": "openssl-perl-0:0.9.7a-43.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-43.11.x86_64", "product_id": "openssl-devel-0:0.9.7a-43.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.x86_64", "product": { "name": "openssl-0:0.9.7a-43.11.x86_64", "product_id": "openssl-0:0.9.7a-43.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.src", "product": { "name": "openssl096b-0:0.9.6b-16.43.src", "product_id": "openssl096b-0:0.9.6b-16.43.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.src", "product": { "name": "openssl-0:0.9.7a-33.18.src", "product_id": "openssl-0:0.9.7a-33.18.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=src" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.src", "product": { "name": "openssl096b-0:0.9.6b-22.43.src", "product_id": "openssl096b-0:0.9.6b-22.43.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.src", "product": { "name": "openssl-0:0.9.7a-43.11.src", "product_id": "openssl-0:0.9.7a-43.11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.43?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.ppc", "product": { "name": "openssl096b-0:0.9.6b-16.43.ppc", "product_id": "openssl096b-0:0.9.6b-16.43.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.ppc", "product": { "name": "openssl-devel-0:0.9.7a-33.18.ppc", "product_id": "openssl-devel-0:0.9.7a-33.18.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.ppc", "product": { "name": "openssl-0:0.9.7a-33.18.ppc", "product_id": "openssl-0:0.9.7a-33.18.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.ppc", "product": { "name": "openssl-perl-0:0.9.7a-33.18.ppc", "product_id": "openssl-perl-0:0.9.7a-33.18.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.43?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.ppc", "product": { "name": "openssl096b-0:0.9.6b-22.43.ppc", "product_id": "openssl096b-0:0.9.6b-22.43.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.ppc", "product": { "name": "openssl-perl-0:0.9.7a-43.11.ppc", "product_id": "openssl-perl-0:0.9.7a-43.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.ppc", "product": { "name": "openssl-devel-0:0.9.7a-43.11.ppc", "product_id": "openssl-devel-0:0.9.7a-43.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.ppc", "product": { "name": "openssl-0:0.9.7a-43.11.ppc", "product_id": "openssl-0:0.9.7a-43.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.43?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.43.s390", "product": { "name": "openssl096b-0:0.9.6b-16.43.s390", "product_id": "openssl096b-0:0.9.6b-16.43.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.43?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.s390", "product": { "name": "openssl-0:0.9.7a-33.18.s390", "product_id": "openssl-0:0.9.7a-33.18.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.s390", "product": { "name": "openssl-devel-0:0.9.7a-33.18.s390", "product_id": "openssl-devel-0:0.9.7a-33.18.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.s390", "product": { "name": "openssl-perl-0:0.9.7a-33.18.s390", "product_id": "openssl-perl-0:0.9.7a-33.18.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.43?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.43.s390", "product": { "name": "openssl096b-0:0.9.6b-22.43.s390", "product_id": "openssl096b-0:0.9.6b-22.43.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.43?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.s390", "product": { "name": "openssl-devel-0:0.9.7a-43.11.s390", "product_id": "openssl-devel-0:0.9.7a-43.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.s390", "product": { "name": "openssl-0:0.9.7a-43.11.s390", "product_id": "openssl-0:0.9.7a-43.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.s390", "product": { "name": "openssl-perl-0:0.9.7a-43.11.s390", "product_id": "openssl-perl-0:0.9.7a-43.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.i686", "product": { "name": "openssl-0:0.9.7a-33.18.i686", "product_id": "openssl-0:0.9.7a-33.18.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i686", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i686", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.i686", "product": { "name": "openssl-0:0.9.7a-43.11.i686", "product_id": "openssl-0:0.9.7a-43.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.ppc64", "product": { "name": "openssl-0:0.9.7a-33.18.ppc64", "product_id": "openssl-0:0.9.7a-33.18.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.ppc64", "product": { "name": "openssl-devel-0:0.9.7a-43.11.ppc64", "product_id": "openssl-devel-0:0.9.7a-43.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.ppc64", "product": { "name": "openssl-0:0.9.7a-43.11.ppc64", "product_id": "openssl-0:0.9.7a-43.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.18.s390x", "product": { "name": "openssl-devel-0:0.9.7a-33.18.s390x", "product_id": "openssl-devel-0:0.9.7a-33.18.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.18?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.18.s390x", "product": { "name": "openssl-0:0.9.7a-33.18.s390x", "product_id": "openssl-0:0.9.7a-33.18.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.18?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.18.s390x", "product": { "name": "openssl-perl-0:0.9.7a-33.18.s390x", "product_id": "openssl-perl-0:0.9.7a-33.18.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.18?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.18?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.11.s390x", "product": { "name": "openssl-perl-0:0.9.7a-43.11.s390x", "product_id": "openssl-perl-0:0.9.7a-43.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.11.s390x", "product": { "name": "openssl-devel-0:0.9.7a-43.11.s390x", "product_id": "openssl-devel-0:0.9.7a-43.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.11.s390x", "product": { "name": "openssl-0:0.9.7a-43.11.s390x", "product_id": "openssl-0:0.9.7a-43.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.src" }, "product_reference": "openssl-0:0.9.7a-33.18.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.src" }, "product_reference": "openssl096b-0:0.9.6b-16.43.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.src" }, "product_reference": "openssl-0:0.9.7a-33.18.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.src" }, "product_reference": "openssl096b-0:0.9.6b-16.43.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.src" }, "product_reference": "openssl-0:0.9.7a-33.18.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.src" }, "product_reference": "openssl096b-0:0.9.6b-16.43.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.src" }, "product_reference": "openssl-0:0.9.7a-33.18.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.18.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.18.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.18.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.src" }, "product_reference": "openssl096b-0:0.9.6b-16.43.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.src" }, "product_reference": "openssl-0:0.9.7a-43.11.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.src" }, "product_reference": "openssl096b-0:0.9.6b-22.43.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.src" }, "product_reference": "openssl-0:0.9.7a-43.11.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.src" }, "product_reference": "openssl096b-0:0.9.6b-22.43.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.src" }, "product_reference": "openssl-0:0.9.7a-43.11.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.src" }, "product_reference": "openssl096b-0:0.9.6b-22.43.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.src" }, "product_reference": "openssl-0:0.9.7a-43.11.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.11.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.11.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.11.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.src" }, "product_reference": "openssl096b-0:0.9.6b-22.43.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.18.i386", "3AS:openssl-0:0.9.7a-33.18.i686", "3AS:openssl-0:0.9.7a-33.18.ia64", "3AS:openssl-0:0.9.7a-33.18.ppc", "3AS:openssl-0:0.9.7a-33.18.ppc64", "3AS:openssl-0:0.9.7a-33.18.s390", "3AS:openssl-0:0.9.7a-33.18.s390x", "3AS:openssl-0:0.9.7a-33.18.src", "3AS:openssl-0:0.9.7a-33.18.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.18.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3AS:openssl-devel-0:0.9.7a-33.18.i386", "3AS:openssl-devel-0:0.9.7a-33.18.ia64", "3AS:openssl-devel-0:0.9.7a-33.18.ppc", "3AS:openssl-devel-0:0.9.7a-33.18.s390", "3AS:openssl-devel-0:0.9.7a-33.18.s390x", "3AS:openssl-devel-0:0.9.7a-33.18.x86_64", "3AS:openssl-perl-0:0.9.7a-33.18.i386", "3AS:openssl-perl-0:0.9.7a-33.18.ia64", "3AS:openssl-perl-0:0.9.7a-33.18.ppc", "3AS:openssl-perl-0:0.9.7a-33.18.s390", "3AS:openssl-perl-0:0.9.7a-33.18.s390x", "3AS:openssl-perl-0:0.9.7a-33.18.x86_64", "3AS:openssl096b-0:0.9.6b-16.43.i386", "3AS:openssl096b-0:0.9.6b-16.43.ia64", "3AS:openssl096b-0:0.9.6b-16.43.ppc", "3AS:openssl096b-0:0.9.6b-16.43.s390", "3AS:openssl096b-0:0.9.6b-16.43.src", "3AS:openssl096b-0:0.9.6b-16.43.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3Desktop:openssl-0:0.9.7a-33.18.i386", "3Desktop:openssl-0:0.9.7a-33.18.i686", "3Desktop:openssl-0:0.9.7a-33.18.ia64", "3Desktop:openssl-0:0.9.7a-33.18.ppc", "3Desktop:openssl-0:0.9.7a-33.18.ppc64", "3Desktop:openssl-0:0.9.7a-33.18.s390", "3Desktop:openssl-0:0.9.7a-33.18.s390x", "3Desktop:openssl-0:0.9.7a-33.18.src", "3Desktop:openssl-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.18.i386", "3Desktop:openssl-devel-0:0.9.7a-33.18.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.18.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.18.s390", "3Desktop:openssl-devel-0:0.9.7a-33.18.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.18.i386", "3Desktop:openssl-perl-0:0.9.7a-33.18.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.18.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.18.s390", "3Desktop:openssl-perl-0:0.9.7a-33.18.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.18.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.43.i386", "3Desktop:openssl096b-0:0.9.6b-16.43.ia64", "3Desktop:openssl096b-0:0.9.6b-16.43.ppc", "3Desktop:openssl096b-0:0.9.6b-16.43.s390", "3Desktop:openssl096b-0:0.9.6b-16.43.src", "3Desktop:openssl096b-0:0.9.6b-16.43.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3ES:openssl-0:0.9.7a-33.18.i386", "3ES:openssl-0:0.9.7a-33.18.i686", "3ES:openssl-0:0.9.7a-33.18.ia64", "3ES:openssl-0:0.9.7a-33.18.ppc", "3ES:openssl-0:0.9.7a-33.18.ppc64", "3ES:openssl-0:0.9.7a-33.18.s390", "3ES:openssl-0:0.9.7a-33.18.s390x", "3ES:openssl-0:0.9.7a-33.18.src", "3ES:openssl-0:0.9.7a-33.18.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.18.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3ES:openssl-devel-0:0.9.7a-33.18.i386", "3ES:openssl-devel-0:0.9.7a-33.18.ia64", "3ES:openssl-devel-0:0.9.7a-33.18.ppc", "3ES:openssl-devel-0:0.9.7a-33.18.s390", "3ES:openssl-devel-0:0.9.7a-33.18.s390x", "3ES:openssl-devel-0:0.9.7a-33.18.x86_64", "3ES:openssl-perl-0:0.9.7a-33.18.i386", "3ES:openssl-perl-0:0.9.7a-33.18.ia64", "3ES:openssl-perl-0:0.9.7a-33.18.ppc", "3ES:openssl-perl-0:0.9.7a-33.18.s390", "3ES:openssl-perl-0:0.9.7a-33.18.s390x", "3ES:openssl-perl-0:0.9.7a-33.18.x86_64", "3ES:openssl096b-0:0.9.6b-16.43.i386", "3ES:openssl096b-0:0.9.6b-16.43.ia64", "3ES:openssl096b-0:0.9.6b-16.43.ppc", "3ES:openssl096b-0:0.9.6b-16.43.s390", "3ES:openssl096b-0:0.9.6b-16.43.src", "3ES:openssl096b-0:0.9.6b-16.43.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3WS:openssl-0:0.9.7a-33.18.i386", "3WS:openssl-0:0.9.7a-33.18.i686", "3WS:openssl-0:0.9.7a-33.18.ia64", "3WS:openssl-0:0.9.7a-33.18.ppc", "3WS:openssl-0:0.9.7a-33.18.ppc64", "3WS:openssl-0:0.9.7a-33.18.s390", "3WS:openssl-0:0.9.7a-33.18.s390x", "3WS:openssl-0:0.9.7a-33.18.src", "3WS:openssl-0:0.9.7a-33.18.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.18.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3WS:openssl-devel-0:0.9.7a-33.18.i386", "3WS:openssl-devel-0:0.9.7a-33.18.ia64", "3WS:openssl-devel-0:0.9.7a-33.18.ppc", "3WS:openssl-devel-0:0.9.7a-33.18.s390", "3WS:openssl-devel-0:0.9.7a-33.18.s390x", "3WS:openssl-devel-0:0.9.7a-33.18.x86_64", "3WS:openssl-perl-0:0.9.7a-33.18.i386", "3WS:openssl-perl-0:0.9.7a-33.18.ia64", "3WS:openssl-perl-0:0.9.7a-33.18.ppc", "3WS:openssl-perl-0:0.9.7a-33.18.s390", "3WS:openssl-perl-0:0.9.7a-33.18.s390x", "3WS:openssl-perl-0:0.9.7a-33.18.x86_64", "3WS:openssl096b-0:0.9.6b-16.43.i386", "3WS:openssl096b-0:0.9.6b-16.43.ia64", "3WS:openssl096b-0:0.9.6b-16.43.ppc", "3WS:openssl096b-0:0.9.6b-16.43.s390", "3WS:openssl096b-0:0.9.6b-16.43.src", "3WS:openssl096b-0:0.9.6b-16.43.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "4AS:openssl-0:0.9.7a-43.11.i386", "4AS:openssl-0:0.9.7a-43.11.i686", "4AS:openssl-0:0.9.7a-43.11.ia64", "4AS:openssl-0:0.9.7a-43.11.ppc", "4AS:openssl-0:0.9.7a-43.11.ppc64", "4AS:openssl-0:0.9.7a-43.11.s390", "4AS:openssl-0:0.9.7a-43.11.s390x", "4AS:openssl-0:0.9.7a-43.11.src", "4AS:openssl-0:0.9.7a-43.11.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.11.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4AS:openssl-devel-0:0.9.7a-43.11.i386", "4AS:openssl-devel-0:0.9.7a-43.11.ia64", "4AS:openssl-devel-0:0.9.7a-43.11.ppc", "4AS:openssl-devel-0:0.9.7a-43.11.ppc64", "4AS:openssl-devel-0:0.9.7a-43.11.s390", "4AS:openssl-devel-0:0.9.7a-43.11.s390x", "4AS:openssl-devel-0:0.9.7a-43.11.x86_64", "4AS:openssl-perl-0:0.9.7a-43.11.i386", "4AS:openssl-perl-0:0.9.7a-43.11.ia64", "4AS:openssl-perl-0:0.9.7a-43.11.ppc", "4AS:openssl-perl-0:0.9.7a-43.11.s390", "4AS:openssl-perl-0:0.9.7a-43.11.s390x", "4AS:openssl-perl-0:0.9.7a-43.11.x86_64", "4AS:openssl096b-0:0.9.6b-22.43.i386", "4AS:openssl096b-0:0.9.6b-22.43.ia64", "4AS:openssl096b-0:0.9.6b-22.43.ppc", "4AS:openssl096b-0:0.9.6b-22.43.s390", "4AS:openssl096b-0:0.9.6b-22.43.src", "4AS:openssl096b-0:0.9.6b-22.43.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4Desktop:openssl-0:0.9.7a-43.11.i386", "4Desktop:openssl-0:0.9.7a-43.11.i686", "4Desktop:openssl-0:0.9.7a-43.11.ia64", "4Desktop:openssl-0:0.9.7a-43.11.ppc", "4Desktop:openssl-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-0:0.9.7a-43.11.s390", "4Desktop:openssl-0:0.9.7a-43.11.s390x", "4Desktop:openssl-0:0.9.7a-43.11.src", "4Desktop:openssl-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.11.i386", "4Desktop:openssl-devel-0:0.9.7a-43.11.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.11.s390", "4Desktop:openssl-devel-0:0.9.7a-43.11.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.11.i386", "4Desktop:openssl-perl-0:0.9.7a-43.11.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.11.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.11.s390", "4Desktop:openssl-perl-0:0.9.7a-43.11.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.11.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.43.i386", "4Desktop:openssl096b-0:0.9.6b-22.43.ia64", "4Desktop:openssl096b-0:0.9.6b-22.43.ppc", "4Desktop:openssl096b-0:0.9.6b-22.43.s390", "4Desktop:openssl096b-0:0.9.6b-22.43.src", "4Desktop:openssl096b-0:0.9.6b-22.43.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4ES:openssl-0:0.9.7a-43.11.i386", "4ES:openssl-0:0.9.7a-43.11.i686", "4ES:openssl-0:0.9.7a-43.11.ia64", "4ES:openssl-0:0.9.7a-43.11.ppc", "4ES:openssl-0:0.9.7a-43.11.ppc64", "4ES:openssl-0:0.9.7a-43.11.s390", "4ES:openssl-0:0.9.7a-43.11.s390x", "4ES:openssl-0:0.9.7a-43.11.src", "4ES:openssl-0:0.9.7a-43.11.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.11.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4ES:openssl-devel-0:0.9.7a-43.11.i386", "4ES:openssl-devel-0:0.9.7a-43.11.ia64", "4ES:openssl-devel-0:0.9.7a-43.11.ppc", "4ES:openssl-devel-0:0.9.7a-43.11.ppc64", "4ES:openssl-devel-0:0.9.7a-43.11.s390", "4ES:openssl-devel-0:0.9.7a-43.11.s390x", "4ES:openssl-devel-0:0.9.7a-43.11.x86_64", "4ES:openssl-perl-0:0.9.7a-43.11.i386", "4ES:openssl-perl-0:0.9.7a-43.11.ia64", "4ES:openssl-perl-0:0.9.7a-43.11.ppc", "4ES:openssl-perl-0:0.9.7a-43.11.s390", "4ES:openssl-perl-0:0.9.7a-43.11.s390x", "4ES:openssl-perl-0:0.9.7a-43.11.x86_64", "4ES:openssl096b-0:0.9.6b-22.43.i386", "4ES:openssl096b-0:0.9.6b-22.43.ia64", "4ES:openssl096b-0:0.9.6b-22.43.ppc", "4ES:openssl096b-0:0.9.6b-22.43.s390", "4ES:openssl096b-0:0.9.6b-22.43.src", "4ES:openssl096b-0:0.9.6b-22.43.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4WS:openssl-0:0.9.7a-43.11.i386", "4WS:openssl-0:0.9.7a-43.11.i686", "4WS:openssl-0:0.9.7a-43.11.ia64", "4WS:openssl-0:0.9.7a-43.11.ppc", "4WS:openssl-0:0.9.7a-43.11.ppc64", "4WS:openssl-0:0.9.7a-43.11.s390", "4WS:openssl-0:0.9.7a-43.11.s390x", "4WS:openssl-0:0.9.7a-43.11.src", "4WS:openssl-0:0.9.7a-43.11.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.11.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4WS:openssl-devel-0:0.9.7a-43.11.i386", "4WS:openssl-devel-0:0.9.7a-43.11.ia64", "4WS:openssl-devel-0:0.9.7a-43.11.ppc", "4WS:openssl-devel-0:0.9.7a-43.11.ppc64", "4WS:openssl-devel-0:0.9.7a-43.11.s390", "4WS:openssl-devel-0:0.9.7a-43.11.s390x", "4WS:openssl-devel-0:0.9.7a-43.11.x86_64", "4WS:openssl-perl-0:0.9.7a-43.11.i386", "4WS:openssl-perl-0:0.9.7a-43.11.ia64", "4WS:openssl-perl-0:0.9.7a-43.11.ppc", "4WS:openssl-perl-0:0.9.7a-43.11.s390", "4WS:openssl-perl-0:0.9.7a-43.11.s390x", "4WS:openssl-perl-0:0.9.7a-43.11.x86_64", "4WS:openssl096b-0:0.9.6b-22.43.i386", "4WS:openssl096b-0:0.9.6b-22.43.ia64", "4WS:openssl096b-0:0.9.6b-22.43.ppc", "4WS:openssl096b-0:0.9.6b-22.43.s390", "4WS:openssl096b-0:0.9.6b-22.43.src", "4WS:openssl096b-0:0.9.6b-22.43.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-06T20:15:00+00:00", "details": "Users of Red Hat Enterprise Linux 2.1 may need to use the command \"up2date\nopenssl openssl095a openssl096\" to install these updated packages on their\nsystems. This is due to a conflict between Galeon and the recent Seamonkey\nupdate. We will provide updated Galeon packages to fix this conflict in\na future erratum.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:openssl-0:0.9.7a-33.18.i386", "3AS:openssl-0:0.9.7a-33.18.i686", "3AS:openssl-0:0.9.7a-33.18.ia64", "3AS:openssl-0:0.9.7a-33.18.ppc", "3AS:openssl-0:0.9.7a-33.18.ppc64", "3AS:openssl-0:0.9.7a-33.18.s390", "3AS:openssl-0:0.9.7a-33.18.s390x", "3AS:openssl-0:0.9.7a-33.18.src", "3AS:openssl-0:0.9.7a-33.18.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.18.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3AS:openssl-devel-0:0.9.7a-33.18.i386", "3AS:openssl-devel-0:0.9.7a-33.18.ia64", "3AS:openssl-devel-0:0.9.7a-33.18.ppc", "3AS:openssl-devel-0:0.9.7a-33.18.s390", "3AS:openssl-devel-0:0.9.7a-33.18.s390x", "3AS:openssl-devel-0:0.9.7a-33.18.x86_64", "3AS:openssl-perl-0:0.9.7a-33.18.i386", "3AS:openssl-perl-0:0.9.7a-33.18.ia64", "3AS:openssl-perl-0:0.9.7a-33.18.ppc", "3AS:openssl-perl-0:0.9.7a-33.18.s390", "3AS:openssl-perl-0:0.9.7a-33.18.s390x", "3AS:openssl-perl-0:0.9.7a-33.18.x86_64", "3AS:openssl096b-0:0.9.6b-16.43.i386", "3AS:openssl096b-0:0.9.6b-16.43.ia64", "3AS:openssl096b-0:0.9.6b-16.43.ppc", "3AS:openssl096b-0:0.9.6b-16.43.s390", "3AS:openssl096b-0:0.9.6b-16.43.src", "3AS:openssl096b-0:0.9.6b-16.43.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3Desktop:openssl-0:0.9.7a-33.18.i386", "3Desktop:openssl-0:0.9.7a-33.18.i686", "3Desktop:openssl-0:0.9.7a-33.18.ia64", "3Desktop:openssl-0:0.9.7a-33.18.ppc", "3Desktop:openssl-0:0.9.7a-33.18.ppc64", "3Desktop:openssl-0:0.9.7a-33.18.s390", "3Desktop:openssl-0:0.9.7a-33.18.s390x", "3Desktop:openssl-0:0.9.7a-33.18.src", "3Desktop:openssl-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.18.i386", "3Desktop:openssl-devel-0:0.9.7a-33.18.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.18.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.18.s390", "3Desktop:openssl-devel-0:0.9.7a-33.18.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.18.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.18.i386", "3Desktop:openssl-perl-0:0.9.7a-33.18.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.18.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.18.s390", "3Desktop:openssl-perl-0:0.9.7a-33.18.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.18.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.43.i386", "3Desktop:openssl096b-0:0.9.6b-16.43.ia64", "3Desktop:openssl096b-0:0.9.6b-16.43.ppc", "3Desktop:openssl096b-0:0.9.6b-16.43.s390", "3Desktop:openssl096b-0:0.9.6b-16.43.src", "3Desktop:openssl096b-0:0.9.6b-16.43.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3ES:openssl-0:0.9.7a-33.18.i386", "3ES:openssl-0:0.9.7a-33.18.i686", "3ES:openssl-0:0.9.7a-33.18.ia64", "3ES:openssl-0:0.9.7a-33.18.ppc", "3ES:openssl-0:0.9.7a-33.18.ppc64", "3ES:openssl-0:0.9.7a-33.18.s390", "3ES:openssl-0:0.9.7a-33.18.s390x", "3ES:openssl-0:0.9.7a-33.18.src", "3ES:openssl-0:0.9.7a-33.18.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.18.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3ES:openssl-devel-0:0.9.7a-33.18.i386", "3ES:openssl-devel-0:0.9.7a-33.18.ia64", "3ES:openssl-devel-0:0.9.7a-33.18.ppc", "3ES:openssl-devel-0:0.9.7a-33.18.s390", "3ES:openssl-devel-0:0.9.7a-33.18.s390x", "3ES:openssl-devel-0:0.9.7a-33.18.x86_64", "3ES:openssl-perl-0:0.9.7a-33.18.i386", "3ES:openssl-perl-0:0.9.7a-33.18.ia64", "3ES:openssl-perl-0:0.9.7a-33.18.ppc", "3ES:openssl-perl-0:0.9.7a-33.18.s390", "3ES:openssl-perl-0:0.9.7a-33.18.s390x", "3ES:openssl-perl-0:0.9.7a-33.18.x86_64", "3ES:openssl096b-0:0.9.6b-16.43.i386", "3ES:openssl096b-0:0.9.6b-16.43.ia64", "3ES:openssl096b-0:0.9.6b-16.43.ppc", "3ES:openssl096b-0:0.9.6b-16.43.s390", "3ES:openssl096b-0:0.9.6b-16.43.src", "3ES:openssl096b-0:0.9.6b-16.43.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "3WS:openssl-0:0.9.7a-33.18.i386", "3WS:openssl-0:0.9.7a-33.18.i686", "3WS:openssl-0:0.9.7a-33.18.ia64", "3WS:openssl-0:0.9.7a-33.18.ppc", "3WS:openssl-0:0.9.7a-33.18.ppc64", "3WS:openssl-0:0.9.7a-33.18.s390", "3WS:openssl-0:0.9.7a-33.18.s390x", "3WS:openssl-0:0.9.7a-33.18.src", "3WS:openssl-0:0.9.7a-33.18.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.18.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.18.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.18.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.18.x86_64", "3WS:openssl-devel-0:0.9.7a-33.18.i386", "3WS:openssl-devel-0:0.9.7a-33.18.ia64", "3WS:openssl-devel-0:0.9.7a-33.18.ppc", "3WS:openssl-devel-0:0.9.7a-33.18.s390", "3WS:openssl-devel-0:0.9.7a-33.18.s390x", "3WS:openssl-devel-0:0.9.7a-33.18.x86_64", "3WS:openssl-perl-0:0.9.7a-33.18.i386", "3WS:openssl-perl-0:0.9.7a-33.18.ia64", "3WS:openssl-perl-0:0.9.7a-33.18.ppc", "3WS:openssl-perl-0:0.9.7a-33.18.s390", "3WS:openssl-perl-0:0.9.7a-33.18.s390x", "3WS:openssl-perl-0:0.9.7a-33.18.x86_64", "3WS:openssl096b-0:0.9.6b-16.43.i386", "3WS:openssl096b-0:0.9.6b-16.43.ia64", "3WS:openssl096b-0:0.9.6b-16.43.ppc", "3WS:openssl096b-0:0.9.6b-16.43.s390", "3WS:openssl096b-0:0.9.6b-16.43.src", "3WS:openssl096b-0:0.9.6b-16.43.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.43.x86_64", "4AS:openssl-0:0.9.7a-43.11.i386", "4AS:openssl-0:0.9.7a-43.11.i686", "4AS:openssl-0:0.9.7a-43.11.ia64", "4AS:openssl-0:0.9.7a-43.11.ppc", "4AS:openssl-0:0.9.7a-43.11.ppc64", "4AS:openssl-0:0.9.7a-43.11.s390", "4AS:openssl-0:0.9.7a-43.11.s390x", "4AS:openssl-0:0.9.7a-43.11.src", "4AS:openssl-0:0.9.7a-43.11.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.11.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4AS:openssl-devel-0:0.9.7a-43.11.i386", "4AS:openssl-devel-0:0.9.7a-43.11.ia64", "4AS:openssl-devel-0:0.9.7a-43.11.ppc", "4AS:openssl-devel-0:0.9.7a-43.11.ppc64", "4AS:openssl-devel-0:0.9.7a-43.11.s390", "4AS:openssl-devel-0:0.9.7a-43.11.s390x", "4AS:openssl-devel-0:0.9.7a-43.11.x86_64", "4AS:openssl-perl-0:0.9.7a-43.11.i386", "4AS:openssl-perl-0:0.9.7a-43.11.ia64", "4AS:openssl-perl-0:0.9.7a-43.11.ppc", "4AS:openssl-perl-0:0.9.7a-43.11.s390", "4AS:openssl-perl-0:0.9.7a-43.11.s390x", "4AS:openssl-perl-0:0.9.7a-43.11.x86_64", "4AS:openssl096b-0:0.9.6b-22.43.i386", "4AS:openssl096b-0:0.9.6b-22.43.ia64", "4AS:openssl096b-0:0.9.6b-22.43.ppc", "4AS:openssl096b-0:0.9.6b-22.43.s390", "4AS:openssl096b-0:0.9.6b-22.43.src", "4AS:openssl096b-0:0.9.6b-22.43.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4Desktop:openssl-0:0.9.7a-43.11.i386", "4Desktop:openssl-0:0.9.7a-43.11.i686", "4Desktop:openssl-0:0.9.7a-43.11.ia64", "4Desktop:openssl-0:0.9.7a-43.11.ppc", "4Desktop:openssl-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-0:0.9.7a-43.11.s390", "4Desktop:openssl-0:0.9.7a-43.11.s390x", "4Desktop:openssl-0:0.9.7a-43.11.src", "4Desktop:openssl-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.11.i386", "4Desktop:openssl-devel-0:0.9.7a-43.11.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.11.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.11.s390", "4Desktop:openssl-devel-0:0.9.7a-43.11.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.11.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.11.i386", "4Desktop:openssl-perl-0:0.9.7a-43.11.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.11.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.11.s390", "4Desktop:openssl-perl-0:0.9.7a-43.11.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.11.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.43.i386", "4Desktop:openssl096b-0:0.9.6b-22.43.ia64", "4Desktop:openssl096b-0:0.9.6b-22.43.ppc", "4Desktop:openssl096b-0:0.9.6b-22.43.s390", "4Desktop:openssl096b-0:0.9.6b-22.43.src", "4Desktop:openssl096b-0:0.9.6b-22.43.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4ES:openssl-0:0.9.7a-43.11.i386", "4ES:openssl-0:0.9.7a-43.11.i686", "4ES:openssl-0:0.9.7a-43.11.ia64", "4ES:openssl-0:0.9.7a-43.11.ppc", "4ES:openssl-0:0.9.7a-43.11.ppc64", "4ES:openssl-0:0.9.7a-43.11.s390", "4ES:openssl-0:0.9.7a-43.11.s390x", "4ES:openssl-0:0.9.7a-43.11.src", "4ES:openssl-0:0.9.7a-43.11.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.11.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4ES:openssl-devel-0:0.9.7a-43.11.i386", "4ES:openssl-devel-0:0.9.7a-43.11.ia64", "4ES:openssl-devel-0:0.9.7a-43.11.ppc", "4ES:openssl-devel-0:0.9.7a-43.11.ppc64", "4ES:openssl-devel-0:0.9.7a-43.11.s390", "4ES:openssl-devel-0:0.9.7a-43.11.s390x", "4ES:openssl-devel-0:0.9.7a-43.11.x86_64", "4ES:openssl-perl-0:0.9.7a-43.11.i386", "4ES:openssl-perl-0:0.9.7a-43.11.ia64", "4ES:openssl-perl-0:0.9.7a-43.11.ppc", "4ES:openssl-perl-0:0.9.7a-43.11.s390", "4ES:openssl-perl-0:0.9.7a-43.11.s390x", "4ES:openssl-perl-0:0.9.7a-43.11.x86_64", "4ES:openssl096b-0:0.9.6b-22.43.i386", "4ES:openssl096b-0:0.9.6b-22.43.ia64", "4ES:openssl096b-0:0.9.6b-22.43.ppc", "4ES:openssl096b-0:0.9.6b-22.43.s390", "4ES:openssl096b-0:0.9.6b-22.43.src", "4ES:openssl096b-0:0.9.6b-22.43.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64", "4WS:openssl-0:0.9.7a-43.11.i386", "4WS:openssl-0:0.9.7a-43.11.i686", "4WS:openssl-0:0.9.7a-43.11.ia64", "4WS:openssl-0:0.9.7a-43.11.ppc", "4WS:openssl-0:0.9.7a-43.11.ppc64", "4WS:openssl-0:0.9.7a-43.11.s390", "4WS:openssl-0:0.9.7a-43.11.s390x", "4WS:openssl-0:0.9.7a-43.11.src", "4WS:openssl-0:0.9.7a-43.11.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.11.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.11.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.11.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.11.x86_64", "4WS:openssl-devel-0:0.9.7a-43.11.i386", "4WS:openssl-devel-0:0.9.7a-43.11.ia64", "4WS:openssl-devel-0:0.9.7a-43.11.ppc", "4WS:openssl-devel-0:0.9.7a-43.11.ppc64", "4WS:openssl-devel-0:0.9.7a-43.11.s390", "4WS:openssl-devel-0:0.9.7a-43.11.s390x", "4WS:openssl-devel-0:0.9.7a-43.11.x86_64", "4WS:openssl-perl-0:0.9.7a-43.11.i386", "4WS:openssl-perl-0:0.9.7a-43.11.ia64", "4WS:openssl-perl-0:0.9.7a-43.11.ppc", "4WS:openssl-perl-0:0.9.7a-43.11.s390", "4WS:openssl-perl-0:0.9.7a-43.11.s390x", "4WS:openssl-perl-0:0.9.7a-43.11.x86_64", "4WS:openssl096b-0:0.9.6b-22.43.i386", "4WS:openssl096b-0:0.9.6b-22.43.ia64", "4WS:openssl096b-0:0.9.6b-22.43.ppc", "4WS:openssl096b-0:0.9.6b-22.43.s390", "4WS:openssl096b-0:0.9.6b-22.43.src", "4WS:openssl096b-0:0.9.6b-22.43.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.43.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0661" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" } ] }
rhsa-2007_0072
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "IBMJava2-JRE and IBMJava2-SDK packages that correct several security issues\nare available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "IBM\u0027s 1.3.1 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nVulnerabilities were discovered in the Java Runtime Environment. An\nuntrusted applet could use these vulnerabilities to access data from other\napplets. (CVE-2006-6736, CVE-2006-6737)\n\nBuffer overflow vulnerabilities were discovered in the Java Runtime\nEnvironment. An untrusted applet could use these flaws to elevate its\nprivileges, possibly reading and writing local files or executing local\napplications. (CVE-2006-6731)\n\nDaniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures. If\nan RSA key with exponent 3 is used, it may be possible to forge a PKCS #1\nv1.5 signature which incorrectly verifies under implementations that do not\ncheck for excess data in the RSA exponentation result of the signature.\n\nAll users of IBMJava2 should upgrade to these updated packages, which\ncontain IBM\u0027s 1.3.1 SR10a Java release which resolves these issues.\n\nPlease note that the packages in this erratum are the same as those we\nreleased on January 24th 2007 with advisories RHBA-2007:0023 and\nRHEA-2007:0024. We have issued this security update as these previous\nadvisories did not specify that they fixed critical security issues. If you\nhave already updated to those versions of IBMJava you will not need to\napply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0072", "url": "https://access.redhat.com/errata/RHSA-2007:0072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "226996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226996" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0072.json" } ], "title": "Red Hat Security Advisory: IBMJava2 security update", "tracking": { "current_release_date": "2024-11-14T10:04:42+00:00", "generator": { "date": "2024-11-14T10:04:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2007:0072", "initial_release_date": "2007-01-24T00:00:00+00:00", "revision_history": [ { "date": "2007-01-24T00:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-02-08T12:01:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:04:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "IBMJava2-JRE-1:1.3.1-12.src", "product": { "name": "IBMJava2-JRE-1:1.3.1-12.src", "product_id": "IBMJava2-JRE-1:1.3.1-12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-12?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "IBMJava2-SDK-1:1.3.1-11.src", "product": { "name": "IBMJava2-SDK-1:1.3.1-11.src", "product_id": "IBMJava2-SDK-1:1.3.1-11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-11?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "IBMJava2-JRE-1:1.3.1-12.i386", "product": { "name": "IBMJava2-JRE-1:1.3.1-12.i386", "product_id": "IBMJava2-JRE-1:1.3.1-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/IBMJava2-JRE@1.3.1-12?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "IBMJava2-SDK-1:1.3.1-11.i386", "product": { "name": "IBMJava2-SDK-1:1.3.1-11.i386", "product_id": "IBMJava2-SDK-1:1.3.1-11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/IBMJava2-SDK@1.3.1-11?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:IBMJava2-JRE-1:1.3.1-12.src" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:IBMJava2-SDK-1:1.3.1-11.src" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:IBMJava2-JRE-1:1.3.1-12.src" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:IBMJava2-SDK-1:1.3.1-11.src" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-JRE-1:1.3.1-12.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:IBMJava2-JRE-1:1.3.1-12.src" }, "product_reference": "IBMJava2-JRE-1:1.3.1-12.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "IBMJava2-SDK-1:1.3.1-11.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" }, "product_reference": "IBMJava2-SDK-1:1.3.1-11.src", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-24T00:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0072" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-6731", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618250" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6731" }, { "category": "external", "summary": "RHBZ#1618250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6731", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-24T00:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0072" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-6736", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618251" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The second issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6736" }, { "category": "external", "summary": "RHBZ#1618251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6736", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-24T00:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0072" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-6737", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618252" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The first issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6737" }, { "category": "external", "summary": "RHBZ#1618252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6737", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-24T00:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0072" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2007-0243", "discovery_date": "2007-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "325941" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-jre: GIF buffer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0243" }, { "category": "external", "summary": "RHBZ#325941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325941" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0243", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0243" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0243" } ], "release_date": "2007-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-01-24T00:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1AS:IBMJava2-JRE-1:1.3.1-12.src", "2.1AS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1AS:IBMJava2-SDK-1:1.3.1-11.src", "2.1ES:IBMJava2-JRE-1:1.3.1-12.i386", "2.1ES:IBMJava2-JRE-1:1.3.1-12.src", "2.1ES:IBMJava2-SDK-1:1.3.1-11.i386", "2.1ES:IBMJava2-SDK-1:1.3.1-11.src", "2.1WS:IBMJava2-JRE-1:1.3.1-12.i386", "2.1WS:IBMJava2-JRE-1:1.3.1-12.src", "2.1WS:IBMJava2-SDK-1:1.3.1-11.i386", "2.1WS:IBMJava2-SDK-1:1.3.1-11.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0072" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-jre: GIF buffer overflow" } ] }
rhsa-2008_0264
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0264", "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:54+00:00", "generator": { "date": "2024-11-22T01:57:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0264", "initial_release_date": "2008-05-20T14:15:00+00:00", "revision_history": [ { "date": "2008-05-20T14:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T10:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.0:el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2007_0062
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages to correct several security issues are now\navailable for Red Hat Enterprise Linux 3 and 4 Extras.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "IBM\u0027s 1.4.2 SR7 Java release includes the IBM Java 2 Runtime Environment\nand the IBM Java 2 Software Development Kit.\n\nA number of security issues were found:\n\nVulnerabilities were discovered in the Java Runtime Environment. An\nuntrusted applet could use these vulnerabilities to access data from other\napplets. (CVE-2006-6736, CVE-2006-6737)\n\nSerialization flaws were discovered in the Java Runtime Environment. An\nuntrusted applet or application could use these flaws to elevate its\nprivileges. (CVE-2006-6745)\n\nBuffer overflow vulnerabilities were discovered in the Java Runtime\nEnvironment. An untrusted applet could use these flaws to elevate its\nprivileges, possibly reading and writing local files or executing local\napplications. (CVE-2006-6731)\n\nDaniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.\nWhere an RSA key with exponent 3 is used it may be possible for an attacker\nto forge a PKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. (CVE-2006-4339)\n\nAll users of java-1.4.2-ibm should upgrade to these updated packages, which\ncontain IBM\u0027s 1.4.2 SR7 Java release which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0062", "url": "https://access.redhat.com/errata/RHSA-2007:0062" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "226981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226981" }, { "category": "external", "summary": "226984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226984" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0062.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:04:37+00:00", "generator": { "date": "2024-11-14T10:04:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2007:0062", "initial_release_date": "2007-02-07T19:57:00+00:00", "revision_history": [ { "date": "2007-02-07T19:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-02-07T14:57:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:04:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.7-1jpp.4.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.7-1jpp.4.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.7-1jpp.4.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.7-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.7-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.7-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.7-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.7-1jpp.4.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-07T19:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0062" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-6731", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618250" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6731" }, { "category": "external", "summary": "RHBZ#1618250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6731", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-07T19:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0062" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-6736", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618251" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The second issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6736" }, { "category": "external", "summary": "RHBZ#1618251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6736", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-07T19:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0062" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-6737", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618252" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The first issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6737" }, { "category": "external", "summary": "RHBZ#1618252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6737", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-07T19:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0062" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-6745", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618253" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6745" }, { "category": "external", "summary": "RHBZ#1618253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6745", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6745" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-07T19:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.7-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.7-1jpp.4.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0062" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2007_0073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1.5.0-ibm packages that correct several security issues are available\nfor Red Hat Enterprise Linux 4 Extras.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "IBM\u0027s 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nVulnerabilities were discovered in the Java Runtime Environment. An\nuntrusted applet could use these vulnerabilities to access data from other\napplets. (CVE-2006-6736, CVE-2006-6737)\n\nSerialization flaws were discovered in the Java Runtime Environment. An\nuntrusted applet or application could use these flaws to elevate its\nprivileges. (CVE-2006-6745)\n\nBuffer overflow vulnerabilities were discovered in the Java Runtime\nEnvironment. An untrusted applet could use these flaws to elevate its\nprivileges, possibly reading and writing local files or executing local\napplications. (CVE-2006-6731)\n\nDaniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.\nWhere an RSA key with exponent 3 is used it may be possible for an attacker\nto forge a PKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. (CVE-2006-4339) \n\nAll users of java-ibm-1.5.0 should upgrade to these packages, which contain\nIBM\u0027s 1.5.0 SR3 Java release which resolves these issues.\n\nPlease note that the packages in this erratum are identical to those we\nreleased on January 24th 2007 in advisory RHEA-2007:0027. We have issued\nthis security update because when we released RHEA-2007:0027 we were not\naware that it contained fixes for security issues. If you have already\nupdated to those packages you will not need to apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0073", "url": "https://access.redhat.com/errata/RHSA-2007:0073" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www-128.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www-128.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "227990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0073.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:04:47+00:00", "generator": { "date": "2024-11-14T10:04:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2007:0073", "initial_release_date": "2007-02-09T16:23:00+00:00", "revision_history": [ { "date": "2007-02-09T16:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-02-09T11:23:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:04:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.3-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.3-1jpp.3.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.3-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.3-1jpp.3.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.3-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.3-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.3-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.3-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.3-1jpp.3.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-09T16:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0073" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-6731", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618250" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6731" }, { "category": "external", "summary": "RHBZ#1618250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6731", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6731" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-09T16:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-6736", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618251" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The second issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6736" }, { "category": "external", "summary": "RHBZ#1618251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6736", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6736" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-09T16:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0073" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-6737", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618252" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to \"access data in other applets,\" aka \"The first issue.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6737" }, { "category": "external", "summary": "RHBZ#1618252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6737", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6737" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-09T16:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0073" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-6745", "discovery_date": "2007-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618253" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-6745" }, { "category": "external", "summary": "RHBZ#1618253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-6745", "url": "https://www.cve.org/CVERecord?id=CVE-2006-6745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-6745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6745" } ], "release_date": "2007-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-09T16:23:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.3-1jpp.3.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.3-1jpp.3.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2008_0525
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0525", "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:58+00:00", "generator": { "date": "2024-11-22T01:57:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0525", "initial_release_date": "2008-06-30T15:36:00+00:00", "revision_history": [ { "date": "2008-06-30T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-30T11:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el3" } } }, { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008_0629
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function\u0027s handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0629", "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:58:01+00:00", "generator": { "date": "2024-11-22T01:58:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0629", "initial_release_date": "2008-08-13T14:16:00+00:00", "revision_history": [ { "date": "2008-08-13T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:16:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:58:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
gsd-2006-4339
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-4339", "description": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "id": "GSD-2006-4339", "references": [ "https://www.suse.com/security/cve/CVE-2006-4339.html", "https://www.debian.org/security/2006/dsa-1174", "https://www.debian.org/security/2006/dsa-1173", "https://access.redhat.com/errata/RHSA-2008:0629", "https://access.redhat.com/errata/RHSA-2008:0525", "https://access.redhat.com/errata/RHSA-2008:0264", "https://access.redhat.com/errata/RHSA-2007:0073", "https://access.redhat.com/errata/RHSA-2007:0072", "https://access.redhat.com/errata/RHSA-2007:0062", "https://access.redhat.com/errata/RHSA-2006:0661", "https://linux.oracle.com/cve/CVE-2006-4339.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-4339" ], "details": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "id": "GSD-2006-4339", "modified": "2023-12-13T01:19:51.259657Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-4339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/22932", "refsource": "MISC", "url": "http://secunia.com/advisories/22932" }, { "name": "http://www.novell.com/linux/security/advisories/2006_26_sr.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "name": "http://secunia.com/advisories/22066", "refsource": "MISC", "url": "http://secunia.com/advisories/22066" }, { "name": "http://www.vupen.com/english/advisories/2006/3748", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "http://docs.info.apple.com/article.html?artnum=304829", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "http://secunia.com/advisories/23155", "refsource": "MISC", "url": "http://secunia.com/advisories/23155" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "http://www.vupen.com/english/advisories/2006/4750", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "http://secunia.com/advisories/60799", "refsource": "MISC", "url": "http://secunia.com/advisories/60799" }, { "name": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", "refsource": "MISC", "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "name": "http://secunia.com/advisories/31492", "refsource": "MISC", "url": "http://secunia.com/advisories/31492" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771", "refsource": "MISC", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540", "refsource": "MISC", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html", "refsource": "MISC", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "name": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "name": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "http://openvpn.net/changelog.html", "refsource": "MISC", "url": "http://openvpn.net/changelog.html" }, { "name": "http://secunia.com/advisories/22259", "refsource": "MISC", "url": "http://secunia.com/advisories/22259" }, { "name": "http://secunia.com/advisories/22260", "refsource": "MISC", "url": "http://secunia.com/advisories/22260" }, { "name": "http://secunia.com/advisories/22284", "refsource": "MISC", "url": "http://secunia.com/advisories/22284" }, { "name": "http://secunia.com/advisories/22671", "refsource": "MISC", "url": "http://secunia.com/advisories/22671" }, { "name": "http://secunia.com/advisories/22758", "refsource": "MISC", "url": "http://secunia.com/advisories/22758" }, { "name": "http://secunia.com/advisories/22799", "refsource": "MISC", "url": "http://secunia.com/advisories/22799" }, { "name": "http://secunia.com/advisories/23680", "refsource": "MISC", "url": "http://secunia.com/advisories/23680" }, { "name": "http://secunia.com/advisories/23794", "refsource": "MISC", "url": "http://secunia.com/advisories/23794" }, { "name": "http://secunia.com/advisories/23915", "refsource": "MISC", "url": "http://secunia.com/advisories/23915" }, { "name": "http://secunia.com/advisories/24930", "refsource": "MISC", "url": "http://secunia.com/advisories/24930" }, { "name": "http://secunia.com/advisories/24950", "refsource": "MISC", "url": "http://secunia.com/advisories/24950" }, { "name": "http://secunia.com/advisories/26329", "refsource": "MISC", "url": "http://secunia.com/advisories/26329" }, { "name": "http://secunia.com/advisories/26893", "refsource": "MISC", "url": "http://secunia.com/advisories/26893" }, { "name": "http://securitytracker.com/id?1017522", "refsource": "MISC", "url": "http://securitytracker.com/id?1017522" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "name": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html", "refsource": "MISC", "url": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "name": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml", "refsource": "MISC", "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "name": "http://www.securityfocus.com/archive/1/456546/100/200/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "name": "http://www.securityfocus.com/archive/1/489739/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/22083", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/22083" }, { "name": "http://www.securityfocus.com/bid/28276", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/28276" }, { "name": "http://www.serv-u.com/releasenotes/", "refsource": "MISC", "url": "http://www.serv-u.com/releasenotes/" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html" }, { "name": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html", "refsource": "MISC", "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "name": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "name": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "refsource": "MISC", "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "refsource": "MISC", "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "name": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "refsource": "MISC", "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "refsource": "MISC", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "refsource": "MISC", "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "refsource": "MISC", "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "name": "http://www.vupen.com/english/advisories/2006/3936", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "name": "http://www.vupen.com/english/advisories/2006/4327", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "name": "http://www.vupen.com/english/advisories/2006/4329", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "name": "http://www.vupen.com/english/advisories/2006/4417", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "name": "http://www.vupen.com/english/advisories/2007/0343", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "name": "http://www.vupen.com/english/advisories/2007/1401", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "name": "http://www.vupen.com/english/advisories/2007/2315", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "name": "http://www.vupen.com/english/advisories/2007/2783", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "name": "http://www.vupen.com/english/advisories/2008/0905/references", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "name": "https://issues.rpath.com/browse/RPL-1633", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144", "refsource": "MISC", "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc", "refsource": "MISC", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "http://secunia.com/advisories/21906", "refsource": "MISC", "url": "http://secunia.com/advisories/21906" }, { "name": "http://secunia.com/advisories/22036", "refsource": "MISC", "url": "http://secunia.com/advisories/22036" }, { "name": "http://secunia.com/advisories/22044", "refsource": "MISC", "url": "http://secunia.com/advisories/22044" }, { "name": "http://secunia.com/advisories/22226", "refsource": "MISC", "url": "http://secunia.com/advisories/22226" }, { "name": "http://secunia.com/advisories/22446", "refsource": "MISC", "url": "http://secunia.com/advisories/22446" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml", "refsource": "MISC", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html", "refsource": "MISC", "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/", "refsource": "MISC", "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "http://www.vupen.com/english/advisories/2006/3899", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742", "refsource": "MISC", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "http://secunia.com/advisories/22523", "refsource": "MISC", "url": "http://secunia.com/advisories/22523" }, { "name": "http://www.vupen.com/english/advisories/2006/4207", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117", "refsource": "MISC", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117" }, { "name": "http://dev2dev.bea.com/pub/advisory/238", "refsource": "MISC", "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "name": "http://docs.info.apple.com/article.html?artnum=307177", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495", "refsource": "MISC", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "http://jvn.jp/en/jp/JVN51615542/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN51615542/index.html" }, { "name": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html", "refsource": "MISC", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html" }, { "name": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "http://secunia.com/advisories/21709", "refsource": "MISC", "url": "http://secunia.com/advisories/21709" }, { "name": "http://secunia.com/advisories/21767", "refsource": "MISC", "url": "http://secunia.com/advisories/21767" }, { "name": "http://secunia.com/advisories/21776", "refsource": "MISC", "url": "http://secunia.com/advisories/21776" }, { "name": "http://secunia.com/advisories/21778", "refsource": "MISC", "url": "http://secunia.com/advisories/21778" }, { "name": "http://secunia.com/advisories/21785", "refsource": "MISC", "url": "http://secunia.com/advisories/21785" }, { "name": "http://secunia.com/advisories/21791", "refsource": "MISC", "url": "http://secunia.com/advisories/21791" }, { "name": "http://secunia.com/advisories/21812", "refsource": "MISC", "url": "http://secunia.com/advisories/21812" }, { "name": "http://secunia.com/advisories/21823", "refsource": "MISC", "url": "http://secunia.com/advisories/21823" }, { "name": "http://secunia.com/advisories/21846", "refsource": "MISC", "url": "http://secunia.com/advisories/21846" }, { "name": "http://secunia.com/advisories/21852", "refsource": "MISC", "url": "http://secunia.com/advisories/21852" }, { "name": "http://secunia.com/advisories/21870", "refsource": "MISC", "url": "http://secunia.com/advisories/21870" }, { "name": "http://secunia.com/advisories/21873", "refsource": "MISC", "url": "http://secunia.com/advisories/21873" }, { "name": "http://secunia.com/advisories/21927", "refsource": "MISC", "url": "http://secunia.com/advisories/21927" }, { "name": "http://secunia.com/advisories/21930", "refsource": "MISC", "url": "http://secunia.com/advisories/21930" }, { "name": "http://secunia.com/advisories/21982", "refsource": "MISC", "url": "http://secunia.com/advisories/21982" }, { "name": "http://secunia.com/advisories/22161", "refsource": "MISC", "url": "http://secunia.com/advisories/22161" }, { "name": "http://secunia.com/advisories/22232", "refsource": "MISC", "url": "http://secunia.com/advisories/22232" }, { "name": "http://secunia.com/advisories/22325", "refsource": "MISC", "url": "http://secunia.com/advisories/22325" }, { "name": "http://secunia.com/advisories/22509", "refsource": "MISC", "url": "http://secunia.com/advisories/22509" }, { "name": "http://secunia.com/advisories/22513", "refsource": "MISC", "url": "http://secunia.com/advisories/22513" }, { "name": "http://secunia.com/advisories/22545", "refsource": "MISC", "url": "http://secunia.com/advisories/22545" }, { "name": "http://secunia.com/advisories/22585", "refsource": "MISC", "url": "http://secunia.com/advisories/22585" }, { "name": "http://secunia.com/advisories/22689", "refsource": "MISC", "url": "http://secunia.com/advisories/22689" }, { "name": "http://secunia.com/advisories/22711", "refsource": "MISC", "url": "http://secunia.com/advisories/22711" }, { "name": "http://secunia.com/advisories/22733", "refsource": "MISC", "url": "http://secunia.com/advisories/22733" }, { "name": "http://secunia.com/advisories/22934", "refsource": "MISC", "url": "http://secunia.com/advisories/22934" }, { "name": "http://secunia.com/advisories/22936", "refsource": "MISC", "url": "http://secunia.com/advisories/22936" }, { "name": "http://secunia.com/advisories/22937", "refsource": "MISC", "url": "http://secunia.com/advisories/22937" }, { "name": "http://secunia.com/advisories/22938", "refsource": "MISC", "url": "http://secunia.com/advisories/22938" }, { "name": "http://secunia.com/advisories/22939", "refsource": "MISC", "url": "http://secunia.com/advisories/22939" }, { "name": "http://secunia.com/advisories/22940", "refsource": "MISC", "url": "http://secunia.com/advisories/22940" }, { "name": "http://secunia.com/advisories/22948", "refsource": "MISC", "url": "http://secunia.com/advisories/22948" }, { "name": "http://secunia.com/advisories/22949", "refsource": "MISC", "url": "http://secunia.com/advisories/22949" }, { "name": "http://secunia.com/advisories/23455", "refsource": "MISC", "url": "http://secunia.com/advisories/23455" }, { "name": "http://secunia.com/advisories/23841", "refsource": "MISC", "url": "http://secunia.com/advisories/23841" }, { "name": "http://secunia.com/advisories/24099", "refsource": "MISC", "url": "http://secunia.com/advisories/24099" }, { "name": "http://secunia.com/advisories/25284", "refsource": "MISC", "url": "http://secunia.com/advisories/25284" }, { "name": "http://secunia.com/advisories/25399", "refsource": "MISC", "url": "http://secunia.com/advisories/25399" }, { "name": "http://secunia.com/advisories/25649", "refsource": "MISC", "url": "http://secunia.com/advisories/25649" }, { "name": "http://secunia.com/advisories/28115", "refsource": "MISC", "url": "http://secunia.com/advisories/28115" }, { "name": "http://secunia.com/advisories/38567", "refsource": "MISC", "url": "http://secunia.com/advisories/38567" }, { "name": "http://secunia.com/advisories/38568", "refsource": "MISC", "url": "http://secunia.com/advisories/38568" }, { "name": "http://secunia.com/advisories/41818", "refsource": "MISC", "url": "http://secunia.com/advisories/41818" }, { "name": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc", "refsource": "MISC", "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc" }, { "name": "http://security.gentoo.org/glsa/glsa-200609-05.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "name": "http://security.gentoo.org/glsa/glsa-200609-18.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "name": "http://securitytracker.com/id?1016791", "refsource": "MISC", "url": "http://securitytracker.com/id?1016791" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "name": "http://support.attachmate.com/techdocs/2127.html", "refsource": "MISC", "url": "http://support.attachmate.com/techdocs/2127.html" }, { "name": "http://support.attachmate.com/techdocs/2128.html", "refsource": "MISC", "url": "http://support.attachmate.com/techdocs/2128.html" }, { "name": "http://support.attachmate.com/techdocs/2137.html", "refsource": "MISC", "url": "http://support.attachmate.com/techdocs/2137.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm" }, { "name": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf", "refsource": "MISC", "url": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf" }, { "name": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html", "refsource": "MISC", "url": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html" }, { "name": "http://www.debian.org/security/2006/dsa-1174", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1174" }, { "name": "http://www.kb.cert.org/vuls/id/845620", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/845620" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207" }, { "name": "http://www.novell.com/linux/security/advisories/2006_61_opera.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "name": "http://www.openbsd.org/errata.html", "refsource": "MISC", "url": "http://www.openbsd.org/errata.html" }, { "name": "http://www.openoffice.org/security/cves/CVE-2006-4339.html", "refsource": "MISC", "url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html" }, { "name": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html", "refsource": "MISC", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html" }, { "name": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html", "refsource": "MISC", "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html" }, { "name": "http://www.openssl.org/news/secadv_20060905.txt", "refsource": "MISC", "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "name": "http://www.opera.com/support/search/supsearch.dml?index=845", "refsource": "MISC", "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "name": "http://www.osvdb.org/28549", "refsource": "MISC", "url": "http://www.osvdb.org/28549" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0661.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0661.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2007-0062.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2007-0072.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2007-0073.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "http://www.securityfocus.com/archive/1/445231/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "name": "http://www.securityfocus.com/archive/1/445822/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "name": "http://www.securityfocus.com/archive/1/450327/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/19849", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/19849" }, { "name": "http://www.sybase.com/detail?id=1047991", "refsource": "MISC", "url": "http://www.sybase.com/detail?id=1047991" }, { "name": "http://www.ubuntu.com/usn/usn-339-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "name": "http://www.us.debian.org/security/2006/dsa-1173", "refsource": "MISC", "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "name": "http://www.vupen.com/english/advisories/2006/3453", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "name": "http://www.vupen.com/english/advisories/2006/3566", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "name": "http://www.vupen.com/english/advisories/2006/3730", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "name": "http://www.vupen.com/english/advisories/2006/3793", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "name": "http://www.vupen.com/english/advisories/2006/4205", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "name": "http://www.vupen.com/english/advisories/2006/4206", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "name": "http://www.vupen.com/english/advisories/2006/4216", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "name": "http://www.vupen.com/english/advisories/2006/4366", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "name": "http://www.vupen.com/english/advisories/2006/4586", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "name": "http://www.vupen.com/english/advisories/2006/4744", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "name": "http://www.vupen.com/english/advisories/2006/5146", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "name": "http://www.vupen.com/english/advisories/2007/0254", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "name": "http://www.vupen.com/english/advisories/2007/1815", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "http://www.vupen.com/english/advisories/2007/1945", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "name": "http://www.vupen.com/english/advisories/2007/2163", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "name": "http://www.vupen.com/english/advisories/2007/4224", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "http://www.vupen.com/english/advisories/2010/0366", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "name": "https://issues.rpath.com/browse/RPL-616", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-616" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656" }, { "name": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html", "refsource": "MISC", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-4339" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-310" } ] } ] }, "references": { "reference_data": [ { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "refsource": "MLIST", "tags": [], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "http://www.openssl.org/news/secadv_20060905.txt", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "name": "21709", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21709" }, { "name": "USN-339-1", "refsource": "UBUNTU", "tags": [ "Patch" ], "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "name": "19849", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19849" }, { "name": "https://issues.rpath.com/browse/RPL-616", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-616" }, { "name": "DSA-1173", "refsource": "DEBIAN", "tags": [ "Patch" ], "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "name": "DSA-1174", "refsource": "DEBIAN", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2006/dsa-1174" }, { "name": "FreeBSD-SA-06:19", "refsource": "FREEBSD", "tags": [], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc" }, { "name": "GLSA-200609-05", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "name": "MDKSA-2006:161", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161" }, { "name": "[3.9] 20060908 011: SECURITY FIX: September 8, 2006", "refsource": "OPENBSD", "tags": [], "url": "http://www.openbsd.org/errata.html" }, { "name": "RHSA-2006:0661", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0661.html" }, { "name": "28549", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/28549" }, { "name": "1016791", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016791" }, { "name": "21778", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21778" }, { "name": "21785", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21785" }, { "name": "21812", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21812" }, { "name": "21823", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21823" }, { "name": "21852", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21852" }, { "name": "21791", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21791" }, { "name": "21767", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21767" }, { "name": "21776", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21776" }, { "name": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/", "refsource": "MISC", "tags": [], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "VU#845620", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/845620" }, { "name": "21873", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21873" }, { "name": "21906", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21906" }, { "name": "21846", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21846" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm" }, { "name": "SSA:2006-257-02", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "name": "21927", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21927" }, { "name": "21870", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21870" }, { "name": "20060901-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "22036", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22036" }, { "name": "http://www.opera.com/support/search/supsearch.dml?index=845", "refsource": "CONFIRM", "tags": [], "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "name": "21982", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21982" }, { "name": "GLSA-200609-18", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "name": "SUSE-SA:2006:055", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "21930", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21930" }, { "name": "22161", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22161" }, { "name": "22259", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22259" }, { "name": "22260", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22260" }, { "name": "http://openvpn.net/changelog.html", "refsource": "CONFIRM", "tags": [], "url": "http://openvpn.net/changelog.html" }, { "name": "102648", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "22226", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22226" }, { "name": "22232", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22232" }, { "name": "http://www.serv-u.com/releasenotes/", "refsource": "CONFIRM", "tags": [], "url": "http://www.serv-u.com/releasenotes/" }, { "name": "22284", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22284" }, { "name": "GLSA-200610-06", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "102657", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "name": "22325", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22325" }, { "name": "22446", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22446" }, { "name": "SUSE-SA:2006:061", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "name": "22509", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22509" }, { "name": "http://support.attachmate.com/techdocs/2137.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.attachmate.com/techdocs/2137.html" }, { "name": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117", "refsource": "CONFIRM", "tags": [], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117" }, { "name": "102656", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "name": "22513", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22513" }, { "name": "22523", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22523" }, { "name": "22545", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22545" }, { "name": "22585", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22585" }, { "name": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf", "refsource": "CONFIRM", "tags": [], "url": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf" }, { "name": "OpenPKG-SA-2006.029", "refsource": "OPENPKG", "tags": [], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html" }, { "name": "SSA:2006-310-01", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "name": "102696", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "name": "22733", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22733" }, { "name": "22671", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22671" }, { "name": "22689", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22689" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL library", "refsource": "CISCO", "tags": [], "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "name": "20061108 Multiple Vulnerabilities in OpenSSL Library", "refsource": "CISCO", "tags": [], "url": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "name": "22758", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22758" }, { "name": "22799", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22799" }, { "name": "http://www.sybase.com/detail?id=1047991", "refsource": "CONFIRM", "tags": [], "url": "http://www.sybase.com/detail?id=1047991" }, { "name": "102686", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "name": "22711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22711" }, { "name": "22934", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22934" }, { "name": "22936", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22936" }, { "name": "22937", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22937" }, { "name": "22938", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22938" }, { "name": "22939", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22939" }, { "name": "22940", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22940" }, { "name": "22949", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22949" }, { "name": "MDKSA-2006:207", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207" }, { "name": "SUSE-SR:2006:026", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "name": "22948", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22948" }, { "name": "102722", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "name": "APPLE-SA-2006-11-28", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "TA06-333A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "23155", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23155" }, { "name": "102744", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "name": "102759", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "name": "23455", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23455" }, { "name": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "name": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "name": "23680", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23680" }, { "name": "23794", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23794" }, { "name": "http://support.attachmate.com/techdocs/2127.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.attachmate.com/techdocs/2127.html" }, { "name": "http://support.attachmate.com/techdocs/2128.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.attachmate.com/techdocs/2128.html" }, { "name": "OpenPKG-SA-2006.018", "refsource": "OPENPKG", "tags": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html" }, { "name": "RHSA-2007:0062", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "name": "RHSA-2007:0072", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "name": "RHSA-2007:0073", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "name": "SUSE-SA:2007:010", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "name": "1017522", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017522" }, { "name": "23841", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23841" }, { "name": "23915", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23915" }, { "name": "22044", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22044" }, { "name": "22932", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22932" }, { "name": "24099", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24099" }, { "name": "24950", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24950" }, { "name": "24930", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24930" }, { "name": "BEA07-169.00", "refsource": "BEA", "tags": [], "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "name": "25284", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25284" }, { "name": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html", "refsource": "CONFIRM", "tags": [], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html" }, { "name": "https://issues.rpath.com/browse/RPL-1633", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "MDKSA-2006:177", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177" }, { "name": "MDKSA-2006:178", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178" }, { "name": "22083", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/22083" }, { "name": "25399", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25399" }, { "name": "25649", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25649" }, { "name": "22066", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22066" }, { "name": "26329", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26329" }, { "name": "26893", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26893" }, { "name": "APPLE-SA-2007-12-14", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "name": "28115", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28115" }, { "name": "201247", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "name": "201534", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "name": "[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "refsource": "MLIST", "tags": [], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html" }, { "name": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "name": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "name": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "name": "28276", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/28276" }, { "name": "200708", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "name": "31492", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/31492" }, { "name": "RHSA-2008:0629", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "SSRT071304", "refsource": "HP", "tags": [], "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "name": "38567", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38567" }, { "name": "http://www.openoffice.org/security/cves/CVE-2006-4339.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html" }, { "name": "ADV-2010-0366", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "name": "38568", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38568" }, { "name": "1000148", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "name": "ADV-2007-2315", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "name": "ADV-2007-2163", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "name": "ADV-2007-1401", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "name": "ADV-2006-4329", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "name": "ADV-2006-3730", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "name": "ADV-2006-3936", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "name": "ADV-2006-3453", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "name": "ADV-2006-4586", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "name": "ADV-2008-0905", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "name": "ADV-2007-1945", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "name": "ADV-2006-4744", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "name": "ADV-2007-1815", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "ADV-2007-0254", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "name": "ADV-2006-4417", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "ADV-2006-4750", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SSRT071299", "refsource": "HP", "tags": [], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "ADV-2006-3566", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "name": "ADV-2006-5146", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "name": "ADV-2006-3793", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "name": "ADV-2006-4366", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "name": "ADV-2007-4224", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "name": "ADV-2006-4327", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "name": "ADV-2006-4206", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "name": "ADV-2007-0343", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "name": "ADV-2006-4207", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "name": "ADV-2007-2783", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "name": "ADV-2006-4216", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "name": "ADV-2006-3899", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "ADV-2006-4205", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "name": "SSRT090208", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "name": "JVNDB-2012-000079", "refsource": "JVNDB", "tags": [], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html" }, { "name": "JVN#51615542", "refsource": "JVN", "tags": [], "url": "http://jvn.jp/en/jp/JVN51615542/index.html" }, { "name": "SSRT061181", "refsource": "HP", "tags": [], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "http://docs.info.apple.com/article.html?artnum=304829", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "http://docs.info.apple.com/article.html?artnum=307177", "refsource": "MISC", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "name": "HPSBMA02250", "refsource": "HP", "tags": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "name": "SSRT061273", "refsource": "HP", "tags": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "name": "GLSA-201408-19", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "name": "60799", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60799" }, { "name": "41818", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/41818" }, { "name": "[bind-announce] 20061103 Internet Systems Consortium Security Advisory. [revised]", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "name": "openssl-rsa-security-bypass(28755)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "name": "oval:org.mitre.oval:def:11656", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656" }, { "name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "name": "20070110 VMware ESX server security updates", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "name": "HPSBUX02165", "refsource": "HP", "tags": [], "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "name": "20060912 ERRATA: [ GLSA 200609-05 ] OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "name": "20060905 rPSA-2006-0163-1 openssl openssl-scripts", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-17T21:35Z", "publishedDate": "2006-09-05T17:04Z" } } }
ghsa-cw9v-mmf8-gmmr
Vulnerability from github
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
{ "affected": [], "aliases": [ "CVE-2006-4339" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-09-05T17:04:00Z", "severity": "MODERATE" }, "details": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "id": "GHSA-cw9v-mmf8-gmmr", "modified": "2022-05-03T03:16:24Z", "published": "2022-05-03T03:16:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1633" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-616" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656" }, { "type": "WEB", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html" }, { "type": "WEB", "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144" }, { "type": "WEB", "url": "http://dev2dev.bea.com/pub/advisory/238" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01070495" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771" }, { "type": "WEB", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN51615542/index.html" }, { "type": "WEB", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "type": "WEB", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html" }, { "type": "WEB", "url": "http://marc.info/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2" }, { "type": "WEB", "url": "http://openvpn.net/changelog.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/21709" }, { "type": "WEB", "url": "http://secunia.com/advisories/21767" }, { "type": "WEB", "url": "http://secunia.com/advisories/21776" }, { "type": "WEB", "url": "http://secunia.com/advisories/21778" }, { "type": "WEB", "url": "http://secunia.com/advisories/21785" }, { "type": "WEB", "url": "http://secunia.com/advisories/21791" }, { "type": "WEB", "url": "http://secunia.com/advisories/21812" }, { "type": "WEB", "url": "http://secunia.com/advisories/21823" }, { "type": "WEB", "url": "http://secunia.com/advisories/21846" }, { "type": "WEB", "url": "http://secunia.com/advisories/21852" }, { "type": "WEB", "url": "http://secunia.com/advisories/21870" }, { "type": "WEB", "url": "http://secunia.com/advisories/21873" }, { "type": "WEB", "url": "http://secunia.com/advisories/21906" }, { "type": "WEB", "url": "http://secunia.com/advisories/21927" }, { "type": "WEB", "url": "http://secunia.com/advisories/21930" }, { "type": "WEB", "url": "http://secunia.com/advisories/21982" }, { "type": "WEB", "url": "http://secunia.com/advisories/22036" }, { "type": "WEB", "url": "http://secunia.com/advisories/22044" }, { "type": "WEB", "url": "http://secunia.com/advisories/22066" }, { "type": "WEB", "url": "http://secunia.com/advisories/22161" }, { "type": "WEB", "url": "http://secunia.com/advisories/22226" }, { "type": "WEB", "url": "http://secunia.com/advisories/22232" }, { "type": "WEB", "url": "http://secunia.com/advisories/22259" }, { "type": "WEB", "url": "http://secunia.com/advisories/22260" }, { "type": "WEB", "url": "http://secunia.com/advisories/22284" }, { "type": "WEB", "url": "http://secunia.com/advisories/22325" }, { "type": "WEB", "url": "http://secunia.com/advisories/22446" }, { "type": "WEB", "url": "http://secunia.com/advisories/22509" }, { "type": "WEB", "url": "http://secunia.com/advisories/22513" }, { "type": "WEB", "url": "http://secunia.com/advisories/22523" }, { "type": "WEB", "url": "http://secunia.com/advisories/22545" }, { "type": "WEB", "url": "http://secunia.com/advisories/22585" }, { "type": "WEB", "url": "http://secunia.com/advisories/22671" }, { "type": "WEB", "url": "http://secunia.com/advisories/22689" }, { "type": "WEB", "url": "http://secunia.com/advisories/22711" }, { "type": "WEB", "url": "http://secunia.com/advisories/22733" }, { "type": "WEB", "url": "http://secunia.com/advisories/22758" }, { "type": "WEB", "url": "http://secunia.com/advisories/22799" }, { "type": "WEB", "url": "http://secunia.com/advisories/22932" }, { "type": "WEB", "url": "http://secunia.com/advisories/22934" }, { "type": "WEB", "url": "http://secunia.com/advisories/22936" }, { "type": "WEB", "url": "http://secunia.com/advisories/22937" }, { "type": "WEB", "url": "http://secunia.com/advisories/22938" }, { "type": "WEB", "url": "http://secunia.com/advisories/22939" }, { "type": "WEB", "url": "http://secunia.com/advisories/22940" }, { "type": "WEB", "url": "http://secunia.com/advisories/22948" }, { "type": "WEB", "url": "http://secunia.com/advisories/22949" }, { "type": "WEB", "url": "http://secunia.com/advisories/23155" }, { "type": "WEB", "url": "http://secunia.com/advisories/23455" }, { "type": "WEB", "url": "http://secunia.com/advisories/23680" }, { "type": "WEB", "url": "http://secunia.com/advisories/23794" }, { "type": "WEB", "url": "http://secunia.com/advisories/23841" }, { "type": "WEB", "url": "http://secunia.com/advisories/23915" }, { "type": "WEB", "url": "http://secunia.com/advisories/24099" }, { "type": "WEB", "url": "http://secunia.com/advisories/24930" }, { "type": "WEB", "url": "http://secunia.com/advisories/24950" }, { "type": "WEB", "url": "http://secunia.com/advisories/25284" }, { "type": "WEB", "url": "http://secunia.com/advisories/25399" }, { "type": "WEB", "url": "http://secunia.com/advisories/25649" }, { "type": "WEB", "url": "http://secunia.com/advisories/26329" }, { "type": "WEB", "url": "http://secunia.com/advisories/26893" }, { "type": "WEB", "url": "http://secunia.com/advisories/28115" }, { "type": "WEB", "url": "http://secunia.com/advisories/31492" }, { "type": "WEB", "url": "http://secunia.com/advisories/38567" }, { "type": "WEB", "url": "http://secunia.com/advisories/38568" }, { "type": "WEB", "url": "http://secunia.com/advisories/41818" }, { "type": "WEB", "url": "http://secunia.com/advisories/60799" }, { "type": "WEB", "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200609-05.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200609-18.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016791" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017522" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.566955" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.605306" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1" }, { "type": "WEB", "url": "http://support.attachmate.com/techdocs/2127.html" }, { "type": "WEB", "url": "http://support.attachmate.com/techdocs/2128.html" }, { "type": "WEB", "url": "http://support.attachmate.com/techdocs/2137.html" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm" }, { "type": "WEB", "url": "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf" }, { "type": "WEB", "url": "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html" }, { "type": "WEB", "url": "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1174" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" }, { "type": "WEB", "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/845620" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207" }, { "type": "WEB", "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_61_opera.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html" }, { "type": "WEB", "url": "http://www.openbsd.org/errata.html" }, { "type": "WEB", "url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html" }, { "type": "WEB", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html" }, { "type": "WEB", "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html" }, { "type": "WEB", "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "type": "WEB", "url": "http://www.opera.com/support/search/supsearch.dml?index=845" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html" }, { "type": "WEB", "url": "http://www.osvdb.org/28549" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0661.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/445231/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/445822/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/450327/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19849" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/22083" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28276" }, { "type": "WEB", "url": "http://www.serv-u.com/releasenotes" }, { "type": "WEB", "url": "http://www.sybase.com/detail?id=1047991" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-339-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "type": "WEB", "url": "http://www.us.debian.org/security/2006/dsa-1173" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "type": "WEB", "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3453" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3566" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3730" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3793" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3936" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4205" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4206" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4207" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4216" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4327" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4329" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4366" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4417" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4586" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4744" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/5146" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0254" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1401" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1945" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2163" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2315" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2783" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/4224" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0905/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0366" }, { "type": "WEB", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "type": "WEB", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=3117" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.