cve-2007-5365
Vulnerability from cvelistv5
Published
2007-10-11 10:00
Modified
2024-08-07 15:31
Severity ?
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
cve@mitre.orghttp://secunia.com/advisories/27160Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27273Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27338Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27350Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32668Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1021157
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1
cve@mitre.orghttp://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1388
cve@mitre.orghttp://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.cPatch
cve@mitre.orghttp://www.openbsd.org/errata40.html#016_dhcpdPatch
cve@mitre.orghttp://www.openbsd.org/errata41.html#010_dhcpdPatch
cve@mitre.orghttp://www.openbsd.org/errata42.html#001_dhcpdPatch
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0970.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/482085/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/483230/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25984Patch
cve@mitre.orghttp://www.securityfocus.com/bid/32213
cve@mitre.orghttp://www.securitytracker.com/id?1018794
cve@mitre.orghttp://www.ubuntu.com/usn/usn-531-1
cve@mitre.orghttp://www.ubuntu.com/usn/usn-531-2
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3088Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37045
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817
cve@mitre.orghttps://www.exploit-db.com/exploits/4601
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:31:57.167Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27338",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27338"
          },
          {
            "name": "27350",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27350"
          },
          {
            "name": "ADV-2008-3088",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3088"
          },
          {
            "name": "4601",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4601"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354"
          },
          {
            "name": "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata42.html#001_dhcpd"
          },
          {
            "name": "25984",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25984"
          },
          {
            "name": "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/483230/100/100/threaded"
          },
          {
            "name": "openbsd-dhcp-bo(37045)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045"
          },
          {
            "name": "RHSA-2007:0970",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0970.html"
          },
          {
            "name": "DSA-1388",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1388"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.coresecurity.com/index.php5?module=ContentMod\u0026action=item\u0026id=1962"
          },
          {
            "name": "USN-531-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-531-1"
          },
          {
            "name": "oval:org.mitre.oval:def:5817",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817"
          },
          {
            "name": "USN-531-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-531-2"
          },
          {
            "name": "27160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27160"
          },
          {
            "name": "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD\u0026acirc;??s DHCP server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/482085/100/100/threaded"
          },
          {
            "name": "27273",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27273"
          },
          {
            "name": "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata40.html#016_dhcpd"
          },
          {
            "name": "243806",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
          },
          {
            "name": "32668",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32668"
          },
          {
            "name": "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata41.html#010_dhcpd"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
          },
          {
            "name": "1018794",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018794"
          },
          {
            "name": "1021157",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021157"
          },
          {
            "name": "32213",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32213"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-10-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27338",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27338"
        },
        {
          "name": "27350",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27350"
        },
        {
          "name": "ADV-2008-3088",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3088"
        },
        {
          "name": "4601",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4601"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354"
        },
        {
          "name": "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata42.html#001_dhcpd"
        },
        {
          "name": "25984",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25984"
        },
        {
          "name": "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/483230/100/100/threaded"
        },
        {
          "name": "openbsd-dhcp-bo(37045)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045"
        },
        {
          "name": "RHSA-2007:0970",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0970.html"
        },
        {
          "name": "DSA-1388",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1388"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.coresecurity.com/index.php5?module=ContentMod\u0026action=item\u0026id=1962"
        },
        {
          "name": "USN-531-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-531-1"
        },
        {
          "name": "oval:org.mitre.oval:def:5817",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817"
        },
        {
          "name": "USN-531-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-531-2"
        },
        {
          "name": "27160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27160"
        },
        {
          "name": "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD\u0026acirc;??s DHCP server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/482085/100/100/threaded"
        },
        {
          "name": "27273",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27273"
        },
        {
          "name": "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata40.html#016_dhcpd"
        },
        {
          "name": "243806",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
        },
        {
          "name": "32668",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32668"
        },
        {
          "name": "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata41.html#010_dhcpd"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
        },
        {
          "name": "1018794",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018794"
        },
        {
          "name": "1021157",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021157"
        },
        {
          "name": "32213",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32213"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5365",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27338",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27338"
            },
            {
              "name": "27350",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27350"
            },
            {
              "name": "ADV-2008-3088",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3088"
            },
            {
              "name": "4601",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4601"
            },
            {
              "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c",
              "refsource": "CONFIRM",
              "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354"
            },
            {
              "name": "[4.2] 20071008 001: SECURITY FIX: October 8, 2007",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata42.html#001_dhcpd"
            },
            {
              "name": "25984",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25984"
            },
            {
              "name": "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/483230/100/100/threaded"
            },
            {
              "name": "openbsd-dhcp-bo(37045)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045"
            },
            {
              "name": "RHSA-2007:0970",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0970.html"
            },
            {
              "name": "DSA-1388",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1388"
            },
            {
              "name": "http://www.coresecurity.com/index.php5?module=ContentMod\u0026action=item\u0026id=1962",
              "refsource": "MISC",
              "url": "http://www.coresecurity.com/index.php5?module=ContentMod\u0026action=item\u0026id=1962"
            },
            {
              "name": "USN-531-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-531-1"
            },
            {
              "name": "oval:org.mitre.oval:def:5817",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817"
            },
            {
              "name": "USN-531-2",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-531-2"
            },
            {
              "name": "27160",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27160"
            },
            {
              "name": "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD\u0026acirc;??s DHCP server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/482085/100/100/threaded"
            },
            {
              "name": "27273",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27273"
            },
            {
              "name": "[4.0] 20071008 016: SECURITY FIX: October 8, 2007",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata40.html#016_dhcpd"
            },
            {
              "name": "243806",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
            },
            {
              "name": "32668",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32668"
            },
            {
              "name": "[4.1] 20071008 010: SECURITY FIX: October 8, 2007",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata41.html#010_dhcpd"
            },
            {
              "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
              "refsource": "CONFIRM",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
            },
            {
              "name": "1018794",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018794"
            },
            {
              "name": "1021157",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021157"
            },
            {
              "name": "32213",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32213"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5365",
    "datePublished": "2007-10-11T10:00:00",
    "dateReserved": "2007-10-10T00:00:00",
    "dateUpdated": "2024-08-07T15:31:57.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-5365\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-10-11T10:17:00.000\",\"lastModified\":\"2018-10-15T21:44:03.047\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n cons_options en el archivo options.c en dhcpd en OpenBSD versiones 4.0 hasta 4.2, y algunas otras implementaciones de dhcpd basadas en ISC dhcp-2, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de una petici\u00f3n DHCP que especifica un tama\u00f1o m\u00e1ximo de mensaje m\u00e1s peque\u00f1o que el IP MTU m\u00ednimo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC77812C-D84E-493E-9D21-1BA6C2129E70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C117F3-3684-4683-9F9E-CEDD5B88F9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF8DD37-A337-4E9D-A34E-C2D561A24285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*\",\"matchCriteriaId\":\"492EA1BE-E678-4300-A690-3BFCD4B233B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*\",\"matchCriteriaId\":\"4E3C9031-F69A-4B6A-A8CB-39027174AA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*\",\"matchCriteriaId\":\"8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7317C4A1-1365-40DD-A86F-808B64863750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"7188371F-AE6E-437D-8F75-DE7049A51000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"79D94087-1308-408F-8C73-600B73AD958F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"015968E1-B81E-4242-B4DF-94716179053B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"DA468ACC-9AE2-4EF6-9B09-CF63092021D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"92262770-06B3-4B68-8DBE-AB6C61135F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"16719C48-5A35-4FEC-BE5F-3EA10A0357CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"C4DC58C1-792B-433D-A27B-5731C8414EBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5F87D3D5-0D3F-44BB-B15B-BB6D903A56E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4AC63928-38F2-4677-8CBC-2F7DE0EF078F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"438EA608-2748-49E9-9B2A-663C774E627F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"41B216C6-4BE9-4D47-A86E-4AD50ECB8F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"B7E3945D-1580-4C68-93E0-E4CF96620C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"32AE7035-EA81-4A9B-A4C3-B85844E24FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"51469BA0-7B46-4E79-9E35-A388AD834B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"948CAA3F-C5B0-434E-A4B1-16600729A17E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"49F52449-96AB-45BA-95F6-581F720D1819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"168AD0C1-B437-4B5D-8AC4-BA4C6C60829B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7FC6243A-A896-4E52-B241-BDEA7486DAC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"CDAD01B1-25E3-4ABD-BA48-03491D9C0D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"E88850F1-A647-44B3-806A-71FC157D4964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B38088AD-968D-44B9-ABCE-4E4D8675A88A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"9D15E371-4317-4882-BA09-F8CABB632C2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"7C385492-0B33-4757-9907-E69C7F709527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"311FC329-D973-4F51-B110-7FF1ED40DFA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"01C7A393-6744-4913-A9CC-75F311D2C59F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0288EC6B-C561-475C-9A3D-1ACF395B7326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F4961C98-1C39-4E6E-A0DB-C48E40F4FF54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"D5CBEFF0-7B69-4831-AAC7-C02455D42900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4DCF6792-8671-4CC0-99D5-7224E2B751A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"6D4F7E6E-330F-4E02-A2FE-F7288ADFFA0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"FFB7E165-13D6-41D5-B1C3-F96669E54796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"B5D6CD58-C4AF-42AC-9377-EC1F1308FF29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D6011B94-9326-47A7-8292-BA0210401DC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"AF924217-C227-4B90-9781-00561CE9C54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"9C2C4B0B-9B7A-4861-8CA8-64FC84DF31BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"114D9D19-23BC-41AF-9B30-40AB2852E74F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F36C1E99-8CCD-48B7-94A7-8753AD7D6FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"F620054A-4D53-443B-8897-B2A5AB928CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"2F57B586-3593-41F9-9D01-0E18F58EB81A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"FD1FDEB4-E659-41D0-B81E-FC1A1391288E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"2E3B6A48-CA60-4ED9-BFF9-0FCDFABA865A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"218570AD-18C7-440E-A5BD-F16708ED4B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"09162A43-7EF2-464D-AD60-7046456932B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"2336F214-18CC-42A5-9DD0-1F1C09959CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"3A4ECA0D-AB73-4790-945B-98CF6E27B94F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"207D2103-58A9-4BF9-81EF-74B264DB1B4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"530E1CDB-3B46-4762-875F-0B1075790204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"8A4F9110-059D-4F6E-9414-762BD6142CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"55888CA5-938A-42D4-9898-93ED1AD88650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"F1B245F6-DE46-4D52-98EE-32601FBCD254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"5D99E1F3-0341-43A9-9692-2AC812811EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"28F4B989-7F55-467F-AD1A-AB965D31F504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"27CA0C51-8331-459A-8256-9E363BE313BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"9B6404BC-090E-419B-B10C-D275D5C0BFE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"3FD00DE9-D8A8-4A03-B4B8-3F4368ADDDE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"4CF81FF0-D544-4C56-AD2E-51098DF2A1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4EFFA4CB-0984-4686-94BD-CE4D8AD70C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"65F861F1-E66D-479D-838D-19D94DF03736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BF0C5932-3B2B-44C8-8C0C-31A0CB66FF7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"71FDF1A5-BD49-4E00-979E-3F953265E681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B40B4B4C-34F3-4591-8989-D7D138D54C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"815771B3-541B-41D5-925F-29CB74900668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"14FD3B27-6379-4F5C-9172-2A0494667727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"1EEAE62A-8BFA-4EB4-B4E9-DF83F4A33CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"114D8B9E-BDE9-49E6-9CD3-18B087522577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"72827B1E-3F3D-40A0-AEEB-0CFFB12BF6D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8275DABB-E792-4134-8418-496109936C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"6F61F300-FEB0-42A7-87AE-E99AF2C26827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"56768A4B-ABC8-4CF8-ABF1-059C8D4373CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"E64D67D0-E57D-46A9-BA7E-BB7FA05C0907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"E249DDE1-EC3B-4A5C-A900-498526173570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"9500D5B2-DA1D-4082-83E4-92715D7F2D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"2BE4A7FC-6112-4879-B083-19CC70DC6B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"DD44C2D3-A690-4A9B-B855-EC2FEE8F5169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"DE882906-FF9D-492A-BDB7-237575D5E278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"C92D0B2A-BA10-4AEB-84B9-962DD1AA76EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"977AA6F7-F821-4229-B413-276231366899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"BF7D0B02-7E5C-4760-96B2-902C680B897C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F7B6E01F-E4EA-497E-BFB3-975F0123B4E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"CF68EA11-632F-4710-8CC7-192AF1BD7BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"9E644312-D55A-427F-BE4C-9AD280CC73F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"F9EC26BC-09D3-4F19-864F-7A1C4EC4756B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"E7B7C4DE-DD83-4F61-B214-F0F9BD76E188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5994A4EE-3808-4863-B771-36864E202679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"EF568362-9967-4ACB-A880-163A2E14D99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"E977D01C-9C4B-411F-844E-7464147A12D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"13B5EE88-E97B-47A1-8999-21C8C4D0C0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"A37177FE-FB56-4BCB-88BA-B91963DA19EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BD456A40-4017-4509-A4B0-44FBB3443645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"BE640F29-CD64-44DD-9561-E205C5C241C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F9456E55-1587-4BBF-A073-601D34E0CDB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"078D7F9B-E2A8-4DC2-AD2E-FB0865091ECE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"CD289DC7-2779-47B6-B44C-6B3C6EC5F93D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0FE35481-4580-4208-A6FA-7A0429D73793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8163CA38-BF92-4F02-85EA-E6EFD5A500F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"84652D52-B89B-4127-9670-5FCDBBDE8053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"6043F9A0-5FA1-4101-8452-E7A8652FE79C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"CE51773E-C93C-4549-907A-5AF380F24B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"3CDC9FF7-5FC1-4473-920F-37105009BF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"D98D67BD-6C94-4E77-B6AC-3199C281A1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"6789ECB3-925F-4E16-9213-12FE3EB191CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"914CF995-B18B-43D2-AA9D-B486E768AFD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"9D309DD1-37A6-49BC-B8DB-6260D47DDD71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"922EE565-E3C2-44BA-9970-224FF874AE4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"28CBB9C9-54DB-4259-9D9F-C617E23C4221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"F8E26C9E-F87E-4484-89B9-42471F8410B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"FC09D568-2B1E-46A2-9029-B3850E5A1167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"79E3D7EB-5B19-4D35-BE23-AB477E08FFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"96E164AF-3346-4FF3-875A-5EA239F50BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D3B05762-2B56-41A1-B424-54A5CFFEC47A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"15B2F895-CBFB-4E19-AF7E-7011EB0A372E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"A6442F9F-E16E-4146-BA6D-92BBCB71EC63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"311F14F7-EE01-4525-8C58-8BF650246026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4D10B1B2-698B-4F02-9392-682AF78EC633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"BC339789-4DC4-4A82-A1BE-CE59AC0D657F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B69EECEC-86DB-4F35-9204-B0931ABC28DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"CF7C1C94-48A4-4F46-A337-92EB7B8C6837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8130EE2C-DC76-4BE3-B2DC-6FC540CD5277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"14C63D62-F6D4-4616-AF05-5E3387D63BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"CFC0C58B-980F-4C65-97BF-67C9E731BA11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"6624E8DE-696A-402C-9088-CFE8ECC086BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B0F7D5DE-0491-47F6-834A-0FA208213010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"04B5A32E-3D42-4500-A2BE-7ADFF3903386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8071BF6A-789C-4DB7-8247-B86EA34DB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"244EBFE7-05DD-4BBB-9793-310D71AC1721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"EECE627D-3AE8-4207-87A8-F95746F693F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"325EF996-AB8D-48CE-9A59-D338C823D927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"E6950900-2293-4DA0-89E8-DAFABBF423DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0EC8063A-1266-4443-B404-BB9C4D265B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"AB4764E7-E772-45BC-896B-C7BE287A8EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"424C989F-99C8-4337-AF15-4A51329938DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4122F0EE-3A2F-456F-B8CF-82565F8DCD4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"5686A925-4978-4883-8DC1-978B09DC9489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"13B81B14-84C8-468A-AE11-30C4CB85E6F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"059880C5-B7FF-492D-97CA-FBC174FF8BF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"6395A3A9-97F2-4C88-B6D6-70DB2ACDC70D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5AC08000-2E71-465A-85F0-1AB8D1A51762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8CC54F69-E96A-482F-B43D-2E3A7EC90E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"CDC656B7-529A-4963-955D-301A11CF5D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"C5D58609-62CB-446F-995E-FD334B89F6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"506769C9-D306-4EEC-BE2E-6E501CBE90BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"37540C8F-FCC1-42DA-8EE3-D3E4FA5B315C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"1B0F8F99-99B0-4A01-884B-442CEF8D061A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"7AD5054B-18D8-44AE-AA4F-A07D12A63E55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0CCE3456-0BA0-4303-B7CE-22B63EE86F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4BAD68C2-4AA2-4346-B279-51206E0651FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"A4027F7E-F867-4DC7-BA53-08D7B36E13F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"96F3D4B3-7828-40EB-BD67-A3CD5B210787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"906228D3-2561-45C0-A79D-BAAC9F1AD7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"C166F9F7-E8AB-4BA1-AEB6-1E7964976801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7BE4DE93-D189-4528-89DA-17E9325457E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"12B6730F-6CF1-4990-953F-1CC76D78B618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"C4D46760-1924-4713-963E-E4A9AD085394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"03B96DE7-70BD-4CD8-9574-8C024E51E91C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"B579204A-62EB-4D86-A22B-0726B9CB88DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"52D5BB76-FF5E-4BBA-A2D0-00EB574B9104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"636FD13F-0A30-4B03-8AEC-ED225FC71251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"C29B1192-D709-48FB-816C-B4F30460E957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"B0593352-A568-4DDA-B1B8-77FA6DC93B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"6DB1AC08-2564-4AAB-82AE-EB504FAA34FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5299CAB1-9819-4AE4-9429-8CA32F692C86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"46D8D5D1-8855-4116-99B3-EA1F78FDEF02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"ECD23A89-A86B-44D3-A3D1-EFF3D8551DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"999FFE1D-D7D4-476B-8A46-9D0179DB570B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"75B778E3-EFCF-4AB0-B2C7-E585C190CD3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"2B14945C-350A-4895-92C1-932208533F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"80CFB4CD-CE38-4F24-87EE-0CA622E4E9A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"513D435B-D28B-4833-88E6-A1A8743177F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"460EE9E9-27BA-4C8B-9F06-BBA648105720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4126C6C9-90AB-470E-AF83-4ED1FDD90511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"57CA01EF-2AFC-44FB-96EE-AF85B3019BEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"3275E47F-5A4B-4843-A07C-82DEE852672C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"CD673F9F-442E-4997-A0E3-D4B595D16B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"58017DDC-63B3-458C-9803-4683211A4C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0BEADEEA-4D63-4E69-BFEE-02205150F909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"6692EE63-A76B-47C3-BC0D-7C15CA6FE013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"54DA5312-D935-444E-8154-514C5BD6E3F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BA1E27E5-FE20-42FA-9A61-A7174E705EB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"65A32803-580D-4D07-B39B-2159258CBA8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"FF6EFE12-51AD-4879-9529-B7EA425059C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"13B51612-3BD6-449F-AD63-D01F8D05B269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"4B2E7E54-2268-4C54-9363-C2D363D3A447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7A54DEC9-4F04-4E0A-B253-8822F114DCC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F6000B0F-0E72-4E68-A5EE-35BA6FB59C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"447E9E9E-5B19-4261-8B70-F63EAE61DB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"51AB0746-66E6-4FF5-9CB2-42E29A01C961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"2B4A015E-802F-4440-AF10-683B5E0586B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D1A9DCF7-F469-4D77-966F-3721F377D80B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"04D12F3A-4C47-4B49-B3DE-484C1EE466E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"3D028821-CA38-48C4-9324-222526AC8413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5BE8232A-2464-449A-A7B6-D44447AA9080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"1F2CB558-9390-4AAE-A66D-E3DA537E3115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"6061C499-21A8-4EC4-B5AD-F6E876B15C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"411B33D1-F55D-42C0-9046-040ABC42E31B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"32CF7469-6D2F-4E34-8013-7F0D3433D0B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"1894C542-AA81-40A9-BF47-AE24C93C1ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"A711CDC2-412C-499D-9FA6-7F25B06267C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"0B837BB7-5F62-4CD5-9C64-8553C28EA8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7BF232A9-9E0A-481E-918D-65FC82EF36D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"0C0C3793-E011-4915-8F86-CE622A2D37D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*\",\"matchCriteriaId\":\"8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33904E65-D50D-4EAE-885D-FE2EBF535F18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A940B9-A553-4A0B-8ECF-52FD26894285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FD8602-7069-41C6-B65C-84928EDCE2D6\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27160\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27273\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27338\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27350\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32668\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021157\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.coresecurity.com/index.php5?module=ContentMod\u0026action=item\u0026id=1962\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1388\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openbsd.org/errata40.html#016_dhcpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openbsd.org/errata41.html#010_dhcpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openbsd.org/errata42.html#001_dhcpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0970.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/482085/100/100/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/483230/100/100/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/25984\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/32213\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018794\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-531-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-531-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3088\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37045\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/4601\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.